SimpleXMQ before 3.4.0, as used in SimpleX Chat before 4.2, does not apply a key derivation function to intended data, which can interfere with forward secrecy and can have other impacts if there is a compromise of a single private key. This occurs in the X3DH key exchange for the double ratchet protocol.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-48103 SimpleXMQ before 3.4.0, as used in SimpleX Chat before 4.2, does not apply a key derivation function to intended data, which can interfere with forward secrecy and can have other impacts if there is a compromise of a single private key. This occurs in the X3DH key exchange for the double ratchet protocol.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 01 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-05-01T13:37:08.170Z

Reserved: 2022-11-12T00:00:00.000Z

Link: CVE-2022-45195

cve-icon Vulnrichment

Updated: 2024-08-03T14:09:56.653Z

cve-icon NVD

Status : Modified

Published: 2022-11-12T19:15:10.707

Modified: 2025-05-01T14:15:34.660

Link: CVE-2022-45195

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.