Cryptomator for Android: Tampered vault configuration allows MITM attack on Hub API
Description
Cryptomator for Android offers multi-platform transparent client-side encryption for files in the cloud. Prior to version 1.12.3, an integrity check vulnerability allows an attacker tamper with the vault configuration file leading to a man-in-the-middle vulnerability in Hub key loading mechanism. Before this fix, the client trusted endpoints from the vault config without host authenticity checks, which could allow token exfiltration by mixing a legitimate auth endpoint with a malicious API endpoint. Impacted are users unlocking Hub-backed vaults with affected client versions in environments where an attacker can alter the vault.cryptomator file. This issue has been patched in version 1.12.3.
Affected products
2- Range: <1.12.3
- cryptomator/androidv5Range: < 1.12.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/cryptomator/android/releases/tag/1.12.3mitrex_refsource_MISC
- github.com/cryptomator/android/security/advisories/GHSA-876q-q3mm-fcvjmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.