Improper resource release in the call termination process in AWS Wickr before version 6.62.13 on Windows, macOS and Linux may allow a call participant to continue receiving audio input from another user after they close their call window. This issue occurs under certain conditions, which require the affected user to take a particular action within the application

To mitigate this issue, users should upgrade AWS Wickr, Wickr Gov and Wickr Enterprise desktop version to version 6.62.13.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Amazon
Amazon aws Wickr
Apple
Apple macos
Linux
Linux linux
Microsoft
Microsoft windows
Vendors & Products Amazon
Amazon aws Wickr
Apple
Apple macos
Linux
Linux linux
Microsoft
Microsoft windows

Fri, 21 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 21 Nov 2025 20:30:00 +0000


Fri, 21 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Description Improper resource release in the call termination process in AWS Wickr before version 6.62.13 on Windows, macOS and Linux may allow a call participant to continue receiving audio input from another user after they close their call window. This issue occurs under certain conditions, which require the affected user to take a particular action within the application To mitigate this issue, users should upgrade AWS Wickr, Wickr Gov and Wickr Enterprise desktop version to version 6.62.13.
Weaknesses CWE-404
References
Metrics cvssV3_1

{'score': 5.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 6.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMZN

Published:

Updated: 2025-11-21T20:58:11.225Z

Reserved: 2025-11-21T19:40:09.924Z

Link: CVE-2025-13524

cve-icon Vulnrichment

Updated: 2025-11-21T20:58:07.397Z

cve-icon NVD

Status : Received

Published: 2025-11-21T20:15:47.130

Modified: 2025-11-21T21:15:50.797

Link: CVE-2025-13524

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-24T09:08:01Z