CVE-2021-32727
low-risk
Published 2021-07-12
Nextcloud Android Client is the Android client for Nextcloud. Clients using the Nextcloud end-to-end encryption feature download the public and private key via an API endpoint. In versions prior to 3.16.1, the Nextcloud Android client skipped a step that involved the client checking if a private key belonged to a previously downloaded public certificate. If the Nextcloud instance served a malicious public key, the data would be encrypted for this key and thus could be accessible to a malicious actor. The vulnerability is patched in version 3.16.1. As a workaround, do not add additional end-to-end encrypted devices to a user account.
Do I need to act?
-
0.17% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.7/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (8)
Third Party Advisory
https://github.com/nextcloud/android/pull/8438
Third Party Advisory
https://github.com/nextcloud/end_to_end_encryption_rfc/blob/7f002996397faefb6640...
Third Party Advisory
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5v33-r...
Permissions Required
https://hackerone.com/reports/1189162
Third Party Advisory
https://github.com/nextcloud/android/pull/8438
Third Party Advisory
https://github.com/nextcloud/end_to_end_encryption_rfc/blob/7f002996397faefb6640...
Third Party Advisory
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5v33-r...
Permissions Required
https://hackerone.com/reports/1189162
28
/ 100
low-risk
Severity
22/34 · High
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal