Description
SimpleXMQ before 3.4.0, as used in SimpleX Chat before 4.2, does not apply a key derivation function to intended data, which can interfere with forward secrecy and can have other impacts if there is a compromise of a single private key. This occurs in the X3DH key exchange for the double ratchet protocol.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-48103 | SimpleXMQ before 3.4.0, as used in SimpleX Chat before 4.2, does not apply a key derivation function to intended data, which can interfere with forward secrecy and can have other impacts if there is a compromise of a single private key. This occurs in the X3DH key exchange for the double ratchet protocol. |
References
History
Thu, 01 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-05-01T13:37:08.170Z
Reserved: 2022-11-12T00:00:00.000Z
Link: CVE-2022-45195
Updated: 2024-08-03T14:09:56.653Z
Status : Modified
Published: 2022-11-12T19:15:10.707
Modified: 2025-05-01T14:15:34.660
Link: CVE-2022-45195
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD