
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in OpenMLS library (GHSA-qr9h-x63w-vqfm) was discovered that prevented private key material from being properly updated in storage during message processing. The bug affects versions up to and including 0.7.0, with version 0.7.1 providing the fix. The vulnerability specifically impacts the keys stored in the MLS secret tree, which are used for decryption of private MLS messages (GitHub Advisory).
The vulnerability scope is limited to private messages (application and handshake messages) received in groups, confined to one epoch, with effects resetting after each epoch transition. Within each epoch, there is a maximum number of private messages per sender (default 1000) that can be skipped before an error occurs. The bug causes the library to incorrectly indicate that private messages have been processed when they haven't, potentially leading to processing errors. The vulnerability has a CVSS v4.0 score of 4.1 (Moderate), with metrics indicating Local attack vector, High attack complexity, and High privileges required (GitHub Advisory).
The security impact is significant when an adversary gains access to the client's state, though the exploitation risk is relatively low in typical use cases. The vulnerability allows decryption of more messages than intended, up to the maximumforwarddistance additional messages per sender in the current epoch. This compromises forward secrecy, as messages previously considered secure become vulnerable to decryption (GitHub Advisory).
Several mitigation strategies are available: 1) Message encryption secrets are automatically deleted during epoch transitions if not configured to retain past secrets. 2) Increasing update/commit frequency helps minimize the compromise window. 3) Creating private messages for each sender of previously received messages using the same MlsGroup object without reloading from storage ensures proper key updates. Post-patch, affected clients are fully healed upon entering the next epoch or when pre-patch epoch state drops out of the retention window (GitHub Advisory).
The vulnerability was responsibly disclosed and addressed, with acknowledgments to Ege Erdogan and Fatih Ergin for reporting the issue (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."