CVE-2022-45195

Severity CVSS v4.0:
Pending analysis
Type:
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
Publication date:
12/11/2022
Last modified:
01/05/2025

Description

SimpleXMQ before 3.4.0, as used in SimpleX Chat before 4.2, does not apply a key derivation function to intended data, which can interfere with forward secrecy and can have other impacts if there is a compromise of a single private key. This occurs in the X3DH key exchange for the double ratchet protocol.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:simplex:simplex_chat:*:*:*:*:*:*:*:* 4.2 (excluding)
cpe:2.3:a:simplex:simplexmq:*:*:*:*:*:*:*:* 3.4.0 (excluding)