Search for vulnerabilities
Vulnerability details: VCID-zwy3-fcfv-aaap
Vulnerability ID VCID-zwy3-fcfv-aaap
Aliases CVE-2022-39251
GHSA-r48r-j8fx-mq2c
Summary Key Exchange without Entity Authentication Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript. Prior to version 19.7.0, an attacker cooperating with a malicious homeserver can construct messages that legitimately appear to have come from another person, without any indication such as a grey shield. Additionally, a sophisticated attacker cooperating with a malicious homeserver could employ this vulnerability to perform a targeted attack in order to send fake to-device messages appearing to originate from another user. This can allow, for example, to inject the key backup secret during a self-verification, to make a targeted device start using a malicious key backup spoofed by the homeserver. These attacks are possible due to a protocol confusion vulnerability that accepts to-device messages encrypted with Megolm instead of Olm. Starting with version 19.7.0, matrix-js-sdk has been modified to only accept Olm-encrypted to-device messages. Out of caution, several other checks have been audited or added. This attack requires coordination between a malicious home server and an attacker, so those who trust their home servers do not need a workaround.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39251.json
epss 0.00114 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00114 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00114 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00114 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
epss 0.00428 https://api.first.org/data/v1/epss?cve=CVE-2022-39251
cvssv3.1 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-r48r-j8fx-mq2c
cvssv3.1 4.1 https://github.com/matrix-org/matrix-js-sdk
generic_textual HIGH https://github.com/matrix-org/matrix-js-sdk
cvssv3.1 8.6 https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76
generic_textual HIGH https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76
ssvc Track https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76
cvssv3.1 8.6 https://github.com/matrix-org/matrix-js-sdk/releases/tag/v19.7.0
generic_textual HIGH https://github.com/matrix-org/matrix-js-sdk/releases/tag/v19.7.0
ssvc Track https://github.com/matrix-org/matrix-js-sdk/releases/tag/v19.7.0
cvssv3.1 8.6 https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-r48r-j8fx-mq2c
cvssv3.1_qr HIGH https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-r48r-j8fx-mq2c
ssvc Track https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-r48r-j8fx-mq2c
cvssv3.1 8.6 https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in-matrix-sdks-and-clients
generic_textual HIGH https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in-matrix-sdks-and-clients
ssvc Track https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in-matrix-sdks-and-clients
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2022-39251
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2022-39251
cvssv3.1 8.6 https://security.gentoo.org/glsa/202210-35
generic_textual HIGH https://security.gentoo.org/glsa/202210-35
ssvc Track https://security.gentoo.org/glsa/202210-35
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2022-43
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39251.json
https://api.first.org/data/v1/epss?cve=CVE-2022-39251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39251
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/matrix-org/matrix-js-sdk
https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76
https://github.com/matrix-org/matrix-js-sdk/releases/tag/v19.7.0
https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in-matrix-sdks-and-clients
https://security.gentoo.org/glsa/202210-35
1021136 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021136
2135396 https://bugzilla.redhat.com/show_bug.cgi?id=2135396
cpe:2.3:a:matrix:javascript_sdk:*:*:*:*:*:node.js:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:matrix:javascript_sdk:*:*:*:*:*:node.js:*:*
CVE-2022-39251 https://nvd.nist.gov/vuln/detail/CVE-2022-39251
GHSA-r48r-j8fx-mq2c https://github.com/advisories/GHSA-r48r-j8fx-mq2c
GHSA-r48r-j8fx-mq2c https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-r48r-j8fx-mq2c
mfsa2022-43 https://www.mozilla.org/en-US/security/advisories/mfsa2022-43
RHSA-2022:7178 https://access.redhat.com/errata/RHSA-2022:7178
RHSA-2022:7181 https://access.redhat.com/errata/RHSA-2022:7181
RHSA-2022:7182 https://access.redhat.com/errata/RHSA-2022:7182
RHSA-2022:7183 https://access.redhat.com/errata/RHSA-2022:7183
RHSA-2022:7184 https://access.redhat.com/errata/RHSA-2022:7184
RHSA-2022:7190 https://access.redhat.com/errata/RHSA-2022:7190
USN-5724-1 https://usn.ubuntu.com/5724-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39251.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:L Found at https://github.com/matrix-org/matrix-js-sdk
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N Found at https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:51:00Z/ Found at https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N Found at https://github.com/matrix-org/matrix-js-sdk/releases/tag/v19.7.0
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:51:00Z/ Found at https://github.com/matrix-org/matrix-js-sdk/releases/tag/v19.7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N Found at https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-r48r-j8fx-mq2c
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:51:00Z/ Found at https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-r48r-j8fx-mq2c
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N Found at https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in-matrix-sdks-and-clients
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:51:00Z/ Found at https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in-matrix-sdks-and-clients
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2022-39251
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2022-39251
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N Found at https://security.gentoo.org/glsa/202210-35
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:51:00Z/ Found at https://security.gentoo.org/glsa/202210-35
Exploit Prediction Scoring System (EPSS)
Percentile 0.45599
EPSS Score 0.00114
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.