First published: Wed Aug 18 2021(Updated: )
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with a computer. Clients using the Nextcloud end-to-end encryption feature download the public and private key via an API endpoint. In versions prior to 3.3.0, the Nextcloud Desktop client fails to check if a private key belongs to previously downloaded public certificate. If the Nextcloud instance serves a malicious public key, the data would be encrypted for this key and thus could be accessible to a malicious actor. This issue is fixed in Nextcloud Desktop Client version 3.3.0. There are no known workarounds aside from upgrading.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/nextcloud-desktop | 2.5.1-3+deb10u2 3.1.1-2+deb11u1 3.7.3-1 3.10.0-1 | |
Nextcloud Desktop | <3.3.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32728 is a vulnerability in the Nextcloud Desktop Client that allows unauthorized access to private keys.
CVE-2021-32728 affects Nextcloud Desktop Client versions prior to 3.3.0.
The severity of CVE-2021-32728 is medium with a CVSS score of 6.5.
To fix CVE-2021-32728, update Nextcloud Desktop Client to version 3.3.0 or newer.
You can find more information about CVE-2021-32728 on the Nextcloud security advisory page and the HackerOne report.