Published:2024/06/07  Last Updated:2024/06/07

JVN#55045256
Multiple vulnerabilities in "FreeFrom - the nostr client" App

Overview

"FreeFrom - the nostr client" App provided by FreeFrom K.K. contains multiple vulnerabilities.

Products Affected

  • "FreeFrom - the nostr client" App for Android versions prior to 1.3.5
  • "FreeFrom - the nostr client" App for iOS versions prior to 1.3.5

Description

"FreeFrom - the nostr client" App provided by FreeFrom K.K. contains multiple vulnerabilities listed below.

  • Improper verification of cryptographic signature (CWE-347)
    • CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Base Score 5.3
    • CVE-2024-36277
  • Reliance on obfuscation or encryption of security-relevant inputs without integrity checking (CWE-649)
    • CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Base Score 5.3
    • CVE-2024-36279
  • Reusing a nonce, key pair in encryption (CWE-323)
    • CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Base Score 5.3
    • CVE-2024-36289

Impact

  • The affected app cannot detect event data with invalid signatures (CVE-2024-36277)
  • The content of direct messages (DMs) between users may be manipulated by a man-in-the-middle attack (CVE-2024-36279, CVE-2024-36289)

Solution

Update the application
Update the application to the latest version according to the information provided by the developer.

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

The people listed below reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Hayato Kimura of University of Hyogo
Ryoma Ito of National Institute of Information and Communications Technology (NICT)
Kazuhiko Minematsu of NEC Corporation/Yokohama National University
Takanori Isobe of University of Hyogo

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2024-36277
CVE-2024-36279
CVE-2024-36289
JVN iPedia JVNDB-2024-000060