First published: Tue Mar 08 2022(Updated: )
Nextcloud talk is a self hosting messaging service. In versions prior to 12.3.0 the Nextcloud Android Talk application did not properly detect the lockscreen state when a call was incoming. If an attacker got physical access to the locked phone, and the victim received a phone call the attacker could gain access to the chat messages and files of the user. It is recommended that the Nextcloud Android Talk App is upgraded to 12.3.0. There are no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Talk Android | <12.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Nextcloud Talk Android vulnerability is CVE-2021-41181.
The severity of CVE-2021-41181 is low.
The affected software for CVE-2021-41181 is Nextcloud Talk Android versions prior to 12.3.0.
CVE-2021-41181 is a vulnerability in the Nextcloud Android Talk application where it did not properly detect the lockscreen state when a call was incoming, allowing an attacker with physical access to a locked phone to exploit the vulnerability.
To fix CVE-2021-41181, users should update to Nextcloud Talk Android version 12.3.0 or later.