Vulnerability Details : CVE-2021-41181
Nextcloud talk is a self hosting messaging service. In versions prior to 12.3.0 the Nextcloud Android Talk application did not properly detect the lockscreen state when a call was incoming. If an attacker got physical access to the locked phone, and the victim received a phone call the attacker could gain access to the chat messages and files of the user. It is recommended that the Nextcloud Android Talk App is upgraded to 12.3.0. There are no known workarounds.
Vulnerability category: BypassGain privilegeInformation leak
Products affected by CVE-2021-41181
- cpe:2.3:a:nextcloud:talk:*:*:*:*:*:android:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-41181
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 20 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-41181
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST | |
2.4
|
LOW | CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
0.9
|
1.4
|
NIST | |
2.4
|
LOW | CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
0.9
|
1.4
|
GitHub, Inc. |
CWE ids for CVE-2021-41181
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: security-advisories@github.com (Secondary)
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-41181
-
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-497c-c8hx-6qcf
Talk app did allow access to sensitive chat messages on lockscreen · Advisory · nextcloud/security-advisories · GitHubThird Party Advisory
-
https://github.com/nextcloud/talk-android/pull/1585
enable keyguard for toggle chat by mahibi · Pull Request #1585 · nextcloud/talk-android · GitHubPatch;Third Party Advisory
Jump to