Skip to main content

CVE-2022-23625: CWE-755: Improper Handling of Exceptional Conditions in wireapp wire-ios

Medium
Published: Fri Mar 11 2022 (03/11/2022, 18:00:15 UTC)
Source: CVE
Vendor/Project: wireapp
Product: wire-ios

Description

Wire-ios is a messaging application using the wire protocol on apple's ios platform. In versions prior to 3.95 malformed resource identifiers may render the iOS Wire Client completely unusable by causing it to repeatedly crash on launch. These malformed resource identifiers can be generated and sent between Wire users. The root cause lies in [wireapp/wire-ios-transport](https://github.com/wireapp/wire-ios-transport), where code responsible for removing sensible tokens before logging may fail and lead to a crash (Swift exception) of the application. This causes undesirable behavior, however the (greater) Wire system is still functional. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/23/2025, 15:19:32 UTC

Technical Analysis

CVE-2022-23625 is a medium-severity vulnerability affecting the Wire iOS messaging application versions prior to 3.95. Wire iOS uses the Wire protocol for secure messaging on Apple's iOS platform. The vulnerability arises from improper handling of exceptional conditions (CWE-755) within the wireapp/wire-ios-transport component. Specifically, when the application receives malformed resource identifiers sent between Wire users, the code responsible for sanitizing sensitive tokens before logging fails to handle these exceptional inputs correctly. This failure triggers a Swift exception that causes the Wire iOS client to crash repeatedly upon launch, rendering the application unusable for the affected user. Although this crash disrupts the local client, the broader Wire system remains operational and unaffected. There are no known workarounds for this issue, making upgrading to version 3.95 or later the only effective remediation. The vulnerability does not require user interaction beyond receiving a malicious message, and no authentication bypass or remote code execution is involved. No known exploits have been reported in the wild as of the published date.

Potential Impact

For European organizations using Wire iOS for secure communications, this vulnerability can cause denial of service at the client level. A malicious actor who can send messages to a target user could exploit this flaw to crash the Wire iOS app repeatedly, effectively blocking the user from accessing their messaging platform. This disruption could hinder timely communication, especially in organizations relying on Wire for sensitive or operational messaging. While the overall Wire infrastructure remains intact, the localized denial of service could impact productivity and incident response capabilities. Confidentiality and integrity of messages are not directly compromised by this vulnerability. However, repeated crashes could lead to user frustration and potential fallback to less secure communication channels. The absence of known exploits reduces immediate risk, but the ease of triggering the crash by sending malformed resource identifiers means the threat could be weaponized in targeted harassment or disruption campaigns.

Mitigation Recommendations

The primary and only effective mitigation is to upgrade all Wire iOS clients to version 3.95 or later, where the issue has been resolved. Organizations should enforce update policies to ensure all users promptly install the patched version. Additionally, organizations can implement messaging filtering or monitoring to detect and block malformed resource identifiers if feasible, although this may require custom tooling or vendor support. User education should emphasize the importance of applying updates and reporting any repeated application crashes immediately. Network-level protections such as restricting message sources to trusted contacts or domains may reduce exposure but are not foolproof. Since no workarounds exist, rapid patch deployment is critical. Monitoring client stability and crash reports can help identify potential exploitation attempts. Finally, organizations should liaise with Wire support for any emerging guidance or patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-01-19T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9842c4522896dcbf2690

Added to database: 5/21/2025, 9:09:22 AM

Last enriched: 6/23/2025, 3:19:32 PM

Last updated: 8/18/2025, 5:40:33 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats