
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was identified in Nextcloud Server's Encryption-at-Rest functionality where exception logging could potentially expose sensitive key material. The issue affects Nextcloud Server versions prior to 20.0.12, 21.0.4, and 22.1.0 (GitHub Advisory).
The vulnerability (CVE-2021-32801) is classified as CWE-532, which relates to information exposure through log files. The issue occurs when exceptions are logged, potentially resulting in the exposure of sensitive encryption key material used for Nextcloud's Encryption-at-Rest functionality (GitHub Advisory).
The vulnerability could lead to the exposure of sensitive encryption key material through log files, potentially compromising the security of the Encryption-at-Rest functionality. However, this only affects users who have implemented the Encryption-at-Rest feature (GitHub Advisory).
The issue has been patched in Nextcloud Server versions 20.0.12, 21.0.4, and 22.1.0. Users are recommended to upgrade to these versions or newer. As a temporary workaround, users can disable logging, though this is not recommended as a long-term solution. Users not utilizing the Encryption-at-Rest functionality are not affected by this vulnerability (GitHub Advisory, GitHub PR).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."