CVE-2022-29160: CWE-284: Improper Access Control in nextcloud security-advisories
Nextcloud Android is the Android client for Nextcloud, a self-hosted productivity platform. Prior to version 3.19.0, sensitive tokens, images, and user related details exist after deletion of a user account. This could result in misuse of the former account holder's information. Nextcloud Android version 3.19.0 contains a patch for this issue. There are no known workarounds available.
AI Analysis
Technical Summary
CVE-2022-29160 is a medium-severity vulnerability affecting the Nextcloud Android client versions prior to 3.19.0. Nextcloud is a widely used self-hosted productivity platform that enables file sharing, collaboration, and synchronization across devices. The Android client stores sensitive user data such as authentication tokens, images, and other user-related details locally on the device. The vulnerability arises from improper access control (CWE-284) in the application's handling of user account deletion. Specifically, when a user account is deleted from the Nextcloud Android app, residual sensitive data remains on the device instead of being securely erased. This leftover data could be accessed or misused by unauthorized parties who gain access to the device or the app's storage, potentially leading to unauthorized access to the former user's account or exposure of private information. The issue was addressed and patched in Nextcloud Android version 3.19.0, which ensures proper deletion of sensitive data upon account removal. No known exploits are currently reported in the wild, and no workarounds exist other than upgrading to the fixed version. The vulnerability does not require user interaction beyond account deletion, and exploitation is limited to scenarios where an attacker has physical or logical access to the affected device or its storage. However, the impact on confidentiality is significant due to the exposure of sensitive tokens and user data, which could lead to account compromise or privacy violations if exploited.
Potential Impact
For European organizations using Nextcloud Android clients, especially those managing sensitive or regulated data, this vulnerability poses a risk of data leakage and unauthorized access. Residual tokens and user data left on devices after account deletion could be extracted by malicious insiders, attackers with physical access, or through malware that gains access to the device storage. This could lead to unauthorized access to corporate Nextcloud instances, exposing confidential documents, communications, and user credentials. The impact is particularly critical for sectors with strict data protection requirements such as finance, healthcare, and government agencies within Europe, where GDPR compliance mandates stringent control over personal and sensitive data. Additionally, organizations with mobile workforces relying on Nextcloud Android clients are at higher risk if devices are lost, stolen, or improperly decommissioned without upgrading the app. Although the vulnerability does not affect the core Nextcloud server, the client-side exposure can undermine overall security posture and trust in the platform. The absence of known exploits reduces immediate risk, but the potential for misuse remains until all affected clients are updated.
Mitigation Recommendations
1. Immediate upgrade of all Nextcloud Android clients to version 3.19.0 or later to ensure the patch is applied and residual sensitive data is properly deleted upon account removal. 2. Implement mobile device management (MDM) policies to enforce app updates and restrict installation of outdated app versions. 3. Enforce device encryption and strong authentication mechanisms (PIN, biometrics) to reduce risk of unauthorized physical access to stored data. 4. Educate users on securely deleting accounts and wiping devices before decommissioning or transfer. 5. Regularly audit and monitor Nextcloud client versions in use across the organization to identify and remediate vulnerable instances. 6. Consider implementing additional endpoint security controls to detect unauthorized access to app storage areas. 7. For highly sensitive environments, consider restricting use of mobile clients or enforcing session timeouts and token revocation policies on the server side to limit token lifespan. 8. Coordinate with Nextcloud administrators to review and tighten server-side access controls and logging to detect suspicious activity potentially stemming from compromised tokens.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Austria
CVE-2022-29160: CWE-284: Improper Access Control in nextcloud security-advisories
Description
Nextcloud Android is the Android client for Nextcloud, a self-hosted productivity platform. Prior to version 3.19.0, sensitive tokens, images, and user related details exist after deletion of a user account. This could result in misuse of the former account holder's information. Nextcloud Android version 3.19.0 contains a patch for this issue. There are no known workarounds available.
AI-Powered Analysis
Technical Analysis
CVE-2022-29160 is a medium-severity vulnerability affecting the Nextcloud Android client versions prior to 3.19.0. Nextcloud is a widely used self-hosted productivity platform that enables file sharing, collaboration, and synchronization across devices. The Android client stores sensitive user data such as authentication tokens, images, and other user-related details locally on the device. The vulnerability arises from improper access control (CWE-284) in the application's handling of user account deletion. Specifically, when a user account is deleted from the Nextcloud Android app, residual sensitive data remains on the device instead of being securely erased. This leftover data could be accessed or misused by unauthorized parties who gain access to the device or the app's storage, potentially leading to unauthorized access to the former user's account or exposure of private information. The issue was addressed and patched in Nextcloud Android version 3.19.0, which ensures proper deletion of sensitive data upon account removal. No known exploits are currently reported in the wild, and no workarounds exist other than upgrading to the fixed version. The vulnerability does not require user interaction beyond account deletion, and exploitation is limited to scenarios where an attacker has physical or logical access to the affected device or its storage. However, the impact on confidentiality is significant due to the exposure of sensitive tokens and user data, which could lead to account compromise or privacy violations if exploited.
Potential Impact
For European organizations using Nextcloud Android clients, especially those managing sensitive or regulated data, this vulnerability poses a risk of data leakage and unauthorized access. Residual tokens and user data left on devices after account deletion could be extracted by malicious insiders, attackers with physical access, or through malware that gains access to the device storage. This could lead to unauthorized access to corporate Nextcloud instances, exposing confidential documents, communications, and user credentials. The impact is particularly critical for sectors with strict data protection requirements such as finance, healthcare, and government agencies within Europe, where GDPR compliance mandates stringent control over personal and sensitive data. Additionally, organizations with mobile workforces relying on Nextcloud Android clients are at higher risk if devices are lost, stolen, or improperly decommissioned without upgrading the app. Although the vulnerability does not affect the core Nextcloud server, the client-side exposure can undermine overall security posture and trust in the platform. The absence of known exploits reduces immediate risk, but the potential for misuse remains until all affected clients are updated.
Mitigation Recommendations
1. Immediate upgrade of all Nextcloud Android clients to version 3.19.0 or later to ensure the patch is applied and residual sensitive data is properly deleted upon account removal. 2. Implement mobile device management (MDM) policies to enforce app updates and restrict installation of outdated app versions. 3. Enforce device encryption and strong authentication mechanisms (PIN, biometrics) to reduce risk of unauthorized physical access to stored data. 4. Educate users on securely deleting accounts and wiping devices before decommissioning or transfer. 5. Regularly audit and monitor Nextcloud client versions in use across the organization to identify and remediate vulnerable instances. 6. Consider implementing additional endpoint security controls to detect unauthorized access to app storage areas. 7. For highly sensitive environments, consider restricting use of mobile clients or enforcing session timeouts and token revocation policies on the server side to limit token lifespan. 8. Coordinate with Nextcloud administrators to review and tighten server-side access controls and logging to detect suspicious activity potentially stemming from compromised tokens.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-04-13T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9848c4522896dcbf64b9
Added to database: 5/21/2025, 9:09:28 AM
Last enriched: 6/22/2025, 1:37:11 AM
Last updated: 8/15/2025, 7:49:41 AM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.