CVE-2022-39252: matrix-sdk-crypto contains potential impersonation via room key forward responses
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.25026%
CWE
Published
9/30/2022
Updated
4/3/2023
KEV Status
No
Technology
Rust
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
matrix-sdk-crypto | rust | < 0.6.0 | 0.6.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from the lack of sender verification in the key forwarding process. The commit diff shows that before the patch, 'receive_supported_keys' directly called 'accept_forwarded_room_key' after getting key info, without checking the sender device's ownership or trust status. The security fix introduced 'should_accept_forward' to validate: 1) the sender device belongs to the current user, and 2) the device is verified. The vulnerable function was 'receive_supported_keys' as it handled incoming keys without these critical checks prior to the patch.