{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-39264","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","dateUpdated":"2025-04-23T16:54:53.291Z","dateReserved":"2022-09-02T00:00:00.000Z","datePublished":"2022-09-28T00:00:00.000Z"},"containers":{"cna":{"title":"nheko vulnerable to secret poisoning using MITM on secret requests by the homeserver","providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2022-10-07T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"nheko is a desktop client for the Matrix communication application. All versions below 0.10.2 are vulnerable homeservers inserting malicious secrets, which could lead to man-in-the-middle attacks. Users can upgrade to version 0.10.2 to protect against this issue. As a workaround, one may apply the patch manually, avoid doing verifications of one's own devices, and/or avoid pressing the request button in the settings menu."}],"affected":[{"vendor":"Nheko-Reborn","product":"nheko","versions":[{"version":"< 0.10.2","status":"affected"}]}],"references":[{"url":"https://github.com/Nheko-Reborn/nheko/security/advisories/GHSA-8jcp-8jq4-5mm7"},{"url":"https://github.com/Nheko-Reborn/nheko/commit/67bee15a389f9b8a9f6c3a340558d1e2319e7199"},{"url":"https://github.com/Nheko-Reborn/nheko/releases/tag/v0.10.2"},{"name":"FEDORA-2022-959b529587","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YBOL6OOQGPZD2RLYT4EHAWTFXNIHLYEN/"},{"name":"FEDORA-2022-1fd94a54a1","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TA6A5ADUVAYKD3ZFLF2JPZOTIOFJOEU7/"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":8.6,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-295: Improper Certificate Validation","cweId":"CWE-295"}]},{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-287: Improper Authentication","cweId":"CWE-287"}]}],"source":{"advisory":"GHSA-8jcp-8jq4-5mm7","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T12:00:43.593Z"},"title":"CVE Program Container","references":[{"url":"https://github.com/Nheko-Reborn/nheko/security/advisories/GHSA-8jcp-8jq4-5mm7","tags":["x_transferred"]},{"url":"https://github.com/Nheko-Reborn/nheko/commit/67bee15a389f9b8a9f6c3a340558d1e2319e7199","tags":["x_transferred"]},{"url":"https://github.com/Nheko-Reborn/nheko/releases/tag/v0.10.2","tags":["x_transferred"]},{"name":"FEDORA-2022-959b529587","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YBOL6OOQGPZD2RLYT4EHAWTFXNIHLYEN/"},{"name":"FEDORA-2022-1fd94a54a1","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TA6A5ADUVAYKD3ZFLF2JPZOTIOFJOEU7/"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-23T15:50:53.434217Z","id":"CVE-2022-39264","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-23T16:54:53.291Z"}}]}}