
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (CVE-2024-52813) affects the matrix-sdk-crypto Rust crate versions prior to 0.8.0. The issue stems from a missing mechanism to notify users when a cryptographic identity changes from a verified to an unverified state. This vulnerability was disclosed and documented in January 2025 (GitHub Advisory).
The vulnerability has been assigned a CVSS v3.1 base score of 4.3 (Moderate), with the following metrics: Network attack vector, Low attack complexity, Low privileges required, No user interaction needed, Unchanged scope, Low confidentiality impact, and No impact on integrity or availability. The complete CVSS string is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N (GitHub Advisory).
The vulnerability could lead to client applications overlooking changes in user cryptographic identity status, potentially affecting the security verification system's reliability. The impact is primarily focused on confidentiality with a low severity rating (GitHub Advisory).
The vulnerability has been patched in matrix-sdk-crypto version 0.8.0, which introduces a new VerificationLevel::VerificationViolation enum variant to indicate when a previously verified identity has been changed. No workarounds are available for earlier versions (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."