Subscriptions
No data.
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 20 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cryptomator for IOS offers multi-platform transparent client-side encryption for files in the cloud. Prior to version 2.8.3, an integrity check vulnerability allows an attacker tamper with the vault configuration file leading to a man-in-the-middle vulnerability in Hub key loading mechanism. Before this fix, the client trusted endpoints from the vault config without host authenticity checks, which could allow token exfiltration by mixing a legitimate auth endpoint with a malicious API endpoint. Impacted are users unlocking Hub-backed vaults with affected client versions in environments where an attacker can alter the vault.cryptomator file. This issue has been patched in version 2.8.3. | |
| Title | Cryptomator for IOS: Tampered vault configuration allows MITM attack on Hub API | |
| Weaknesses | CWE-346 CWE-354 CWE-451 CWE-923 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T19:20:49.867Z
Reserved: 2026-03-11T21:16:21.660Z
Link: CVE-2026-32318
Updated: 2026-03-20T19:20:29.845Z
Status : Received
Published: 2026-03-20T19:16:16.277
Modified: 2026-03-20T19:16:16.277
Link: CVE-2026-32318
No data.
OpenCVE Enrichment
No data.