CVE-2022-45195

SimpleXMQ before 3.4.0, as used in SimpleX Chat before 4.2, does not apply a key derivation function to intended data, which can interfere with forward secrecy and can have other impacts if there is a compromise of a single private key. This occurs in the X3DH key exchange for the double ratchet protocol.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:simplex:simplex_chat:*:*:*:*:*:*:*:*
cpe:2.3:a:simplex:simplexmq:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:28

Type Values Removed Values Added
References () https://github.com/simplex-chat/simplexmq/compare/v3.3.0...v3.4.0 - Release Notes, Third Party Advisory () https://github.com/simplex-chat/simplexmq/compare/v3.3.0...v3.4.0 - Release Notes, Third Party Advisory
References () https://github.com/simplex-chat/simplexmq/pull/548 - Patch, Third Party Advisory () https://github.com/simplex-chat/simplexmq/pull/548 - Patch, Third Party Advisory
References () https://github.com/trailofbits/publications/blob/master/reviews/SimpleXChat.pdf - Exploit, Technical Description, Third Party Advisory () https://github.com/trailofbits/publications/blob/master/reviews/SimpleXChat.pdf - Exploit, Technical Description, Third Party Advisory
References () https://simplex.chat/blog/20221108-simplex-chat-v4.2-security-audit-new-website.html - Release Notes, Vendor Advisory () https://simplex.chat/blog/20221108-simplex-chat-v4.2-security-audit-new-website.html - Release Notes, Vendor Advisory

Information

Published : 2022-11-12 19:15

Updated : 2025-05-01 14:15


NVD link : CVE-2022-45195

Mitre link : CVE-2022-45195

CVE.ORG link : CVE-2022-45195


JSON object : View

Products Affected

simplex

  • simplex_chat
  • simplexmq
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm