// For flags

CVE-2022-39254

When matrix-nio receives forwarded room keys, the receiver doesn't check if it requested the key from the forwarder

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

matrix-nio is a Python Matrix client library, designed according to sans I/O principles. Prior to version 0.20, when a users requests a room key from their devices, the software correctly remember the request. Once they receive a forwarded room key, they accept it without checking who the room key came from. This allows homeservers to try to insert room keys of questionable validity, potentially mounting an impersonation attack. Version 0.20 fixes the issue.

matrix-nio es una librería cliente de Matrix en Python, diseñada según los principios de sans I/O. En versiones anteriores a 0.20, cuando los usuarios solicitaban una llave de habitación desde sus dispositivos, el software recordaba correctamente la petición. Una vez que reciben una llave de habitación reenviada, la aceptan sin comprobar de quién procede la llave de habitación. Esto permite que los servidores domésticos intenten introducir llaves de habitación de dudosa validez, montando potencialmente un ataque de suplantación de identidad. La versión 0.20 corrige el problema

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
High
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-09-02 CVE Reserved
  • 2022-09-29 CVE Published
  • 2024-04-21 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-287: Improper Authentication
  • CWE-322: Key Exchange without Entity Authentication
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Matrix-nio Project
Search vendor "Matrix-nio Project"
Matrix-nio
Search vendor "Matrix-nio Project" for product "Matrix-nio"
< 0.20
Search vendor "Matrix-nio Project" for product "Matrix-nio" and version " < 0.20"
-
Affected