Cryptomator for IOS: Tampered vault configuration allows MITM attack on Hub API
Description
Cryptomator for IOS offers multi-platform transparent client-side encryption for files in the cloud. Prior to version 2.8.3, an integrity check vulnerability allows an attacker tamper with the vault configuration file leading to a man-in-the-middle vulnerability in Hub key loading mechanism. Before this fix, the client trusted endpoints from the vault config without host authenticity checks, which could allow token exfiltration by mixing a legitimate auth endpoint with a malicious API endpoint. Impacted are users unlocking Hub-backed vaults with affected client versions in environments where an attacker can alter the vault.cryptomator file. This issue has been patched in version 2.8.3.
Affected products
2- Range: <2.8.3
- cryptomator/iosv5Range: < 2.8.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/cryptomator/ios/commit/98c31280304af65c0932eb547d5fe4be2d16929cmitrex_refsource_MISC
- github.com/cryptomator/ios/pull/444mitrex_refsource_MISC
- github.com/cryptomator/ios/releases/tag/2.8.3mitrex_refsource_MISC
- github.com/cryptomator/ios/security/advisories/GHSA-g7fr-c82r-hm6jmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.