Search for vulnerabilities
Vulnerability details: VCID-4auq-kdk4-aaad
Vulnerability ID VCID-4auq-kdk4-aaad
Aliases CVE-2022-39249
GHSA-6263-x97c-c4gg
Summary Key Exchange without Entity Authentication Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript. Prior to version 19.7.0, an attacker cooperating with a malicious homeserver can construct messages appearing to have come from another person. Such messages will be marked with a grey shield on some platforms, but this may be missing in others. This attack is possible due to the matrix-js-sdk implementing a too permissive key forwarding strategy on the receiving end. Starting with version 19.7.0, the default policy for accepting key forwards has been made more strict in the matrix-js-sdk. matrix-js-sdk will now only accept forwarded keys in response to previously issued requests and only from own, verified devices. The SDK now sets a `trusted` flag on the decrypted message upon decryption, based on whether the key used to decrypt the message was received from a trusted source. Clients need to ensure that messages decrypted with a key with `trusted = false` are decorated appropriately, for example, by showing a warning for such messages. This attack requires coordination between a malicious homeserver and an attacker, and those who trust your homeservers do not need a workaround.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39249.json
epss 0.00126 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00126 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00126 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00126 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00126 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00126 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00126 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00126 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00126 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00126 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00126 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00127 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00133 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00133 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00133 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00133 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
epss 0.00427 https://api.first.org/data/v1/epss?cve=CVE-2022-39249
cvssv3.1 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-6263-x97c-c4gg
cvssv3.1 4.1 https://github.com/matrix-org/matrix-js-sdk
generic_textual HIGH https://github.com/matrix-org/matrix-js-sdk
cvssv3.1 7.5 https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76
cvssv3.1 8.6 https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76
generic_textual HIGH https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76
ssvc Track https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76
cvssv3.1 7.5 https://github.com/matrix-org/matrix-js-sdk/releases/tag/v19.7.0
cvssv3.1 8.6 https://github.com/matrix-org/matrix-js-sdk/releases/tag/v19.7.0
generic_textual HIGH https://github.com/matrix-org/matrix-js-sdk/releases/tag/v19.7.0
ssvc Track https://github.com/matrix-org/matrix-js-sdk/releases/tag/v19.7.0
cvssv3.1 7.5 https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-6263-x97c-c4gg
cvssv3.1_qr HIGH https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-6263-x97c-c4gg
ssvc Track https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-6263-x97c-c4gg
cvssv3.1 7.5 https://github.com/matrix-org/matrix-spec-proposals/pull/3061
generic_textual HIGH https://github.com/matrix-org/matrix-spec-proposals/pull/3061
ssvc Track https://github.com/matrix-org/matrix-spec-proposals/pull/3061
cvssv3.1 7.5 https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in-matrix-sdks-and-clients
cvssv3.1 8.6 https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in-matrix-sdks-and-clients
generic_textual HIGH https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in-matrix-sdks-and-clients
ssvc Track https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in-matrix-sdks-and-clients
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2022-39249
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2022-39249
cvssv3.1 7.5 https://security.gentoo.org/glsa/202210-35
cvssv3.1 8.6 https://security.gentoo.org/glsa/202210-35
generic_textual HIGH https://security.gentoo.org/glsa/202210-35
ssvc Track https://security.gentoo.org/glsa/202210-35
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2022-43
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39249.json
https://api.first.org/data/v1/epss?cve=CVE-2022-39249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39249
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/matrix-org/matrix-js-sdk
https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76
https://github.com/matrix-org/matrix-js-sdk/releases/tag/v19.7.0
https://github.com/matrix-org/matrix-spec-proposals/pull/3061
https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in-matrix-sdks-and-clients
https://security.gentoo.org/glsa/202210-35
1021136 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021136
2135393 https://bugzilla.redhat.com/show_bug.cgi?id=2135393
cpe:2.3:a:matrix:javascript_sdk:*:*:*:*:*:node.js:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:matrix:javascript_sdk:*:*:*:*:*:node.js:*:*
CVE-2022-39249 https://nvd.nist.gov/vuln/detail/CVE-2022-39249
GHSA-6263-x97c-c4gg https://github.com/advisories/GHSA-6263-x97c-c4gg
GHSA-6263-x97c-c4gg https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-6263-x97c-c4gg
mfsa2022-43 https://www.mozilla.org/en-US/security/advisories/mfsa2022-43
RHSA-2022:7178 https://access.redhat.com/errata/RHSA-2022:7178
RHSA-2022:7181 https://access.redhat.com/errata/RHSA-2022:7181
RHSA-2022:7182 https://access.redhat.com/errata/RHSA-2022:7182
RHSA-2022:7183 https://access.redhat.com/errata/RHSA-2022:7183
RHSA-2022:7184 https://access.redhat.com/errata/RHSA-2022:7184
RHSA-2022:7190 https://access.redhat.com/errata/RHSA-2022:7190
USN-5724-1 https://usn.ubuntu.com/5724-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39249.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:L Found at https://github.com/matrix-org/matrix-js-sdk
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N Found at https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:51:04Z/ Found at https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://github.com/matrix-org/matrix-js-sdk/releases/tag/v19.7.0
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N Found at https://github.com/matrix-org/matrix-js-sdk/releases/tag/v19.7.0
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:51:04Z/ Found at https://github.com/matrix-org/matrix-js-sdk/releases/tag/v19.7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-6263-x97c-c4gg
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:51:04Z/ Found at https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-6263-x97c-c4gg
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://github.com/matrix-org/matrix-spec-proposals/pull/3061
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:51:04Z/ Found at https://github.com/matrix-org/matrix-spec-proposals/pull/3061
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in-matrix-sdks-and-clients
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N Found at https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in-matrix-sdks-and-clients
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:51:04Z/ Found at https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in-matrix-sdks-and-clients
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2022-39249
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2022-39249
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://security.gentoo.org/glsa/202210-35
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N Found at https://security.gentoo.org/glsa/202210-35
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:51:04Z/ Found at https://security.gentoo.org/glsa/202210-35
Exploit Prediction Scoring System (EPSS)
Percentile 0.48211
EPSS Score 0.00126
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.