Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:matrix:element:*:*:*:*:*:android:*:*", "matchCriteriaId": "D575EEBA-AD7C-404F-965B-16DE5BFAE908", "versionEndExcluding": "1.2.2", "vulnerable": true}, {"criteria": "cpe:2.3:a:matrix:matrix-android-sdk2:*:*:*:*:*:android:*:*", "matchCriteriaId": "A35A1290-9B73-49EB-AB28-41D9AA9587F1", "versionEndExcluding": "1.2.2", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "A logic error in the room key sharing functionality of Element Android before 1.2.2 and matrix-android-sdk2 (aka Matrix SDK for Android) before 1.2.2 allows a malicious Matrix homeserver present in an encrypted room to steal room encryption keys (via crafted Matrix protocol messages) that were originally sent by affected Matrix clients participating in that room. This allows the attacker to decrypt end-to-end encrypted messages sent by affected clients."}, {"lang": "es", "value": "Un error l\u00f3gico en la funcionalidad de compartici\u00f3n de claves de sala de Element Android antes de la versi\u00f3n 1.2.2 y matrix-android-sdk2 (tambi\u00e9n conocido como Matrix SDK para Android) antes de la versi\u00f3n 1.2.2 permite a un servidor dom\u00e9stico de Matrix malicioso presente en una sala cifrada robar las claves de cifrado de la sala (a trav\u00e9s de mensajes de protocolo de Matrix falsificados) que fueron enviados originalmente por los clientes de Matrix afectados que participan en esa sala. Esto permite al atacante descifrar los mensajes cifrados de extremo a extremo enviados por los clientes afectados"}], "id": "CVE-2021-40824", "lastModified": "2024-11-21T06:24:50.803", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-09-13T19:15:19.340", "references": [{"source": "cve@mitre.org", "tags": ["Patch", "Third Party Advisory"], "url": "https://github.com/matrix-org/matrix-android-sdk2/releases/tag/v1.2.2"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://matrix.org/blog/2021/09/13/vulnerability-disclosure-key-sharing"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Third Party Advisory"], "url": "https://github.com/matrix-org/matrix-android-sdk2/releases/tag/v1.2.2"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://matrix.org/blog/2021/09/13/vulnerability-disclosure-key-sharing"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-290"}], "source": "nvd@nist.gov", "type": "Primary"}]}