First published: Thu Jun 03 2021(Updated: )
wire-ios is the iOS version of Wire, an open-source secure messaging app. wire-ios versions 3.8.0 and earlier have a bug in which a conversation could be incorrectly set to "unverified. This occurs when: - Self user is added to a new conversation - Self user is added to an existing conversation - All the participants in the conversation were previously marked as verified. The vulnerability is patched in wire-ios version 3.8.1. As a workaround, one can unverify & verify a device in the conversation.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wire Wire | <3.81 |
https://github.com/wireapp/wire-ios-data-model/commit/bf9db85886b12a20c8374f55b7c4a610e8ae9220
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32665 is a vulnerability in the wire-ios version 3.8.0 and earlier, where a conversation could be incorrectly set to "unverified" when a self user is added to a new or existing conversation.
The severity of CVE-2021-32665 is high with a CVSS score of 6.5.
CVE-2021-32665 affects wire-ios versions 3.8.0 and earlier, where a conversation can be incorrectly set to "unverified" when a self user is added to a new or existing conversation.
To fix CVE-2021-32665, users should update their wire-ios app to version 3.8.1 or later where the bug has been fixed.
Yes, you can find more information about CVE-2021-32665 in the following references: [Reference 1](https://github.com/wireapp/wire-ios-data-model/commit/bf9db85886b12a20c8374f55b7c4a610e8ae9220) and [Reference 2](https://github.com/wireapp/wire-ios/security/advisories/GHSA-mc65-7w99-c6qv).