First published: Fri Aug 12 2022(Updated: )
Nextcloud Talk is a video and audio conferencing app for Nextcloud. Prior to versions 12.2.7, 13.0.7, and 14.0.3, password protected conversations are susceptible to brute force attacks if the attacker has the link/conversation token. It is recommended that the Nextcloud Talk application is upgraded to 12.2.7, 13.0.7 or 14.0.3. There are currently no known workarounds available apart from not having password protected conversations.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud talk | <12.2.7 | |
Nextcloud talk | >=13.0.0<13.0.7 | |
Nextcloud talk | >=14.0.0<14.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35932 is a vulnerability that affects Nextcloud Talk, a video and audio conferencing app for Nextcloud, prior to versions 12.2.7, 13.0.7, and 14.0.3.
CVE-2022-35932 makes password protected conversations in Nextcloud Talk susceptible to brute force attacks if the attacker has the link/conversation token.
CVE-2022-35932 has a severity score of 5.3, which is considered medium.
To fix CVE-2022-35932, it is recommended to upgrade the Nextcloud Talk application to versions 12.2.7, 13.0.7, or 14.0.3.
More information about CVE-2022-35932 can be found in the Nextcloud security advisories on GitHub.