CVE-2022-39200: CWE-347: Improper Verification of Cryptographic Signature in matrix-org dendrite
Dendrite is a Matrix homeserver written in Go. In affected versions events retrieved from a remote homeserver using the `/get_missing_events` path did not have their signatures verified correctly. This could potentially allow a remote homeserver to provide invalid/modified events to Dendrite via this endpoint. Note that this does not apply to events retrieved through other endpoints (e.g. `/event`, `/state`) as they have been correctly verified. Homeservers that have federation disabled are not vulnerable. The problem has been fixed in Dendrite 0.9.8. Users are advised to upgrade. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-39200 is a medium-severity vulnerability affecting Dendrite, a Matrix homeserver implementation written in Go. The vulnerability stems from improper verification of cryptographic signatures on events retrieved from remote homeservers via the `/get_missing_events` federation endpoint. Specifically, events fetched through this endpoint were not correctly validated for signature authenticity, potentially allowing a malicious or compromised remote homeserver to inject invalid or modified events into the local Dendrite server. This flaw does not affect other federation endpoints such as `/event` or `/state`, which correctly verify event signatures. The issue is present in Dendrite versions prior to 0.9.8 and has been resolved in version 0.9.8. Homeservers with federation disabled are not vulnerable, as the attack vector relies on federated event retrieval. No known exploits have been reported in the wild, and no workarounds exist aside from upgrading to a patched version. The root cause relates to CWE-347, improper verification of cryptographic signatures, which undermines the integrity and authenticity guarantees critical to federated communication in Matrix. An attacker controlling a remote homeserver could exploit this vulnerability to inject forged events, potentially misleading users or disrupting communication channels within the Matrix ecosystem.
Potential Impact
For European organizations using Dendrite as their Matrix homeserver, this vulnerability poses risks primarily to the integrity and trustworthiness of federated communications. An attacker controlling or compromising a remote homeserver could inject falsified events, potentially leading to misinformation, unauthorized actions, or disruption of collaboration workflows. While confidentiality is less directly impacted, the integrity compromise could facilitate social engineering, misinformation campaigns, or operational disruptions. Availability impact is limited but possible if injected events cause server instability or force administrators to take systems offline for remediation. Organizations relying on Matrix for sensitive communications, especially in sectors like government, finance, or critical infrastructure, could face reputational damage or operational risks if exploited. Since the vulnerability requires federation to be enabled and interaction with remote homeservers, organizations with isolated or non-federated deployments are not at risk. The absence of known exploits reduces immediate threat but does not eliminate the risk, especially as threat actors may develop exploits over time.
Mitigation Recommendations
The primary mitigation is to upgrade all Dendrite homeserver instances to version 0.9.8 or later, where the signature verification flaw has been corrected. Organizations should audit their Matrix deployments to confirm the version in use and ensure timely patching. For environments where immediate upgrade is not feasible, temporarily disabling federation can eliminate the attack vector, though this reduces interoperability. Administrators should monitor federation logs for anomalous or unexpected event activity that could indicate attempted exploitation. Implementing network-level controls to restrict federation to trusted homeservers can reduce exposure. Additionally, organizations should review their incident response plans to include scenarios involving federated event tampering. Regular backups and integrity checks of critical communication data can aid recovery if an incident occurs. Finally, engaging with the Matrix community for updates and best practices will help maintain a secure deployment.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Norway, Denmark, Belgium, Switzerland
CVE-2022-39200: CWE-347: Improper Verification of Cryptographic Signature in matrix-org dendrite
Description
Dendrite is a Matrix homeserver written in Go. In affected versions events retrieved from a remote homeserver using the `/get_missing_events` path did not have their signatures verified correctly. This could potentially allow a remote homeserver to provide invalid/modified events to Dendrite via this endpoint. Note that this does not apply to events retrieved through other endpoints (e.g. `/event`, `/state`) as they have been correctly verified. Homeservers that have federation disabled are not vulnerable. The problem has been fixed in Dendrite 0.9.8. Users are advised to upgrade. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-39200 is a medium-severity vulnerability affecting Dendrite, a Matrix homeserver implementation written in Go. The vulnerability stems from improper verification of cryptographic signatures on events retrieved from remote homeservers via the `/get_missing_events` federation endpoint. Specifically, events fetched through this endpoint were not correctly validated for signature authenticity, potentially allowing a malicious or compromised remote homeserver to inject invalid or modified events into the local Dendrite server. This flaw does not affect other federation endpoints such as `/event` or `/state`, which correctly verify event signatures. The issue is present in Dendrite versions prior to 0.9.8 and has been resolved in version 0.9.8. Homeservers with federation disabled are not vulnerable, as the attack vector relies on federated event retrieval. No known exploits have been reported in the wild, and no workarounds exist aside from upgrading to a patched version. The root cause relates to CWE-347, improper verification of cryptographic signatures, which undermines the integrity and authenticity guarantees critical to federated communication in Matrix. An attacker controlling a remote homeserver could exploit this vulnerability to inject forged events, potentially misleading users or disrupting communication channels within the Matrix ecosystem.
Potential Impact
For European organizations using Dendrite as their Matrix homeserver, this vulnerability poses risks primarily to the integrity and trustworthiness of federated communications. An attacker controlling or compromising a remote homeserver could inject falsified events, potentially leading to misinformation, unauthorized actions, or disruption of collaboration workflows. While confidentiality is less directly impacted, the integrity compromise could facilitate social engineering, misinformation campaigns, or operational disruptions. Availability impact is limited but possible if injected events cause server instability or force administrators to take systems offline for remediation. Organizations relying on Matrix for sensitive communications, especially in sectors like government, finance, or critical infrastructure, could face reputational damage or operational risks if exploited. Since the vulnerability requires federation to be enabled and interaction with remote homeservers, organizations with isolated or non-federated deployments are not at risk. The absence of known exploits reduces immediate threat but does not eliminate the risk, especially as threat actors may develop exploits over time.
Mitigation Recommendations
The primary mitigation is to upgrade all Dendrite homeserver instances to version 0.9.8 or later, where the signature verification flaw has been corrected. Organizations should audit their Matrix deployments to confirm the version in use and ensure timely patching. For environments where immediate upgrade is not feasible, temporarily disabling federation can eliminate the attack vector, though this reduces interoperability. Administrators should monitor federation logs for anomalous or unexpected event activity that could indicate attempted exploitation. Implementing network-level controls to restrict federation to trusted homeservers can reduce exposure. Additionally, organizations should review their incident response plans to include scenarios involving federated event tampering. Regular backups and integrity checks of critical communication data can aid recovery if an incident occurs. Finally, engaging with the Matrix community for updates and best practices will help maintain a secure deployment.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-02T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9845c4522896dcbf3eb1
Added to database: 5/21/2025, 9:09:25 AM
Last enriched: 6/22/2025, 9:36:39 PM
Last updated: 8/15/2025, 2:39:25 AM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.