Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 20 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cryptomator for IOS offers multi-platform transparent client-side encryption for files in the cloud. Prior to version 2.8.3, an integrity check vulnerability allows an attacker tamper with the vault configuration file leading to a man-in-the-middle vulnerability in Hub key loading mechanism. Before this fix, the client trusted endpoints from the vault config without host authenticity checks, which could allow token exfiltration by mixing a legitimate auth endpoint with a malicious API endpoint. Impacted are users unlocking Hub-backed vaults with affected client versions in environments where an attacker can alter the vault.cryptomator file. This issue has been patched in version 2.8.3. | |
| Title | Cryptomator for IOS: Tampered vault configuration allows MITM attack on Hub API | |
| Weaknesses | CWE-346 CWE-354 CWE-451 CWE-923 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T19:20:49.867Z
Reserved: 2026-03-11T21:16:21.660Z
Link: CVE-2026-32318
Updated: 2026-03-20T19:20:29.845Z
Status : Received
Published: 2026-03-20T19:16:16.277
Modified: 2026-03-20T19:16:16.277
Link: CVE-2026-32318
No data.
OpenCVE Enrichment
No data.