Vulnerability Details : CVE-2022-45195
SimpleXMQ before 3.4.0, as used in SimpleX Chat before 4.2, does not apply a key derivation function to intended data, which can interfere with forward secrecy and can have other impacts if there is a compromise of a single private key. This occurs in the X3DH key exchange for the double ratchet protocol.
Exploit prediction scoring system (EPSS) score for CVE-2022-45195
Probability of exploitation activity in the next 30 days: 0.08%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 35 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2022-45195
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.6
|
3.6
|
NIST |
CWE ids for CVE-2022-45195
-
The product uses a broken or risky cryptographic algorithm or protocol.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-45195
-
https://github.com/simplex-chat/simplexmq/compare/v3.3.0...v3.4.0
Comparing v3.3.0...v3.4.0 · simplex-chat/simplexmq · GitHubRelease Notes;Third Party Advisory
-
https://github.com/simplex-chat/simplexmq/pull/548
use KDF in X3DH by epoberezkin · Pull Request #548 · simplex-chat/simplexmq · GitHubPatch;Third Party Advisory
-
https://github.com/trailofbits/publications/blob/master/reviews/SimpleXChat.pdf
publications/SimpleXChat.pdf at master · trailofbits/publications · GitHubExploit;Technical Description;Third Party Advisory
-
https://simplex.chat/blog/20221108-simplex-chat-v4.2-security-audit-new-website.html
SimpleX blog: Security assessment by Trail of Bits, the new website and v4.2 releasedRelease Notes;Vendor Advisory
Products affected by CVE-2022-45195
- cpe:2.3:a:simplex:simplex_chat:*:*:*:*:*:*:*:*
- cpe:2.3:a:simplex:simplexmq:*:*:*:*:*:*:*:*