First published: Fri Apr 14 2023(Updated: )
matrix-js-sdk is the Matrix Client-Server SDK for JavaScript and TypeScript. An attacker present in a room where an MSC3401 group call is taking place can eavesdrop on the video and audio of participants using matrix-js-sdk, without their knowledge. To affected matrix-js-sdk users, the attacker will not appear to be participating in the call. This attack is possible because matrix-js-sdk's group call implementation accepts incoming direct calls from other users, even if they have not yet declared intent to participate in the group call, as a means of resolving a race condition in call setup. Affected versions do not restrict access to the user's outbound media in this case. Legacy 1:1 calls are unaffected. This is fixed in matrix-js-sdk 24.1.0. As a workaround, users may hold group calls in private rooms where only the exact users who are expected to participate in the call are present.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Matrix Javascript Sdk | <24.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29529 is a vulnerability in the matrix-js-sdk library that allows an attacker to eavesdrop on video and audio in group calls without the participants' knowledge.
CVE-2023-29529 affects matrix-js-sdk users by enabling attackers present in a group call to eavesdrop on the video and audio of participants without their knowledge.
The severity of CVE-2023-29529 is medium with a severity value of 5.3.
The matrix-js-sdk version up to and exclusive of 24.1.0 is affected by CVE-2023-29529.
To fix the CVE-2023-29529 vulnerability in matrix-js-sdk, update to a version that is higher than 24.1.0.