Skip to main content

CVE-2022-39200: CWE-347: Improper Verification of Cryptographic Signature in matrix-org dendrite

Medium
Published: Mon Sep 12 2022 (09/12/2022, 20:10:09 UTC)
Source: CVE
Vendor/Project: matrix-org
Product: dendrite

Description

Dendrite is a Matrix homeserver written in Go. In affected versions events retrieved from a remote homeserver using the `/get_missing_events` path did not have their signatures verified correctly. This could potentially allow a remote homeserver to provide invalid/modified events to Dendrite via this endpoint. Note that this does not apply to events retrieved through other endpoints (e.g. `/event`, `/state`) as they have been correctly verified. Homeservers that have federation disabled are not vulnerable. The problem has been fixed in Dendrite 0.9.8. Users are advised to upgrade. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/22/2025, 21:36:39 UTC

Technical Analysis

CVE-2022-39200 is a medium-severity vulnerability affecting Dendrite, a Matrix homeserver implementation written in Go. The vulnerability stems from improper verification of cryptographic signatures on events retrieved from remote homeservers via the `/get_missing_events` federation endpoint. Specifically, events fetched through this endpoint were not correctly validated for signature authenticity, potentially allowing a malicious or compromised remote homeserver to inject invalid or modified events into the local Dendrite server. This flaw does not affect other federation endpoints such as `/event` or `/state`, which correctly verify event signatures. The issue is present in Dendrite versions prior to 0.9.8 and has been resolved in version 0.9.8. Homeservers with federation disabled are not vulnerable, as the attack vector relies on federated event retrieval. No known exploits have been reported in the wild, and no workarounds exist aside from upgrading to a patched version. The root cause relates to CWE-347, improper verification of cryptographic signatures, which undermines the integrity and authenticity guarantees critical to federated communication in Matrix. An attacker controlling a remote homeserver could exploit this vulnerability to inject forged events, potentially misleading users or disrupting communication channels within the Matrix ecosystem.

Potential Impact

For European organizations using Dendrite as their Matrix homeserver, this vulnerability poses risks primarily to the integrity and trustworthiness of federated communications. An attacker controlling or compromising a remote homeserver could inject falsified events, potentially leading to misinformation, unauthorized actions, or disruption of collaboration workflows. While confidentiality is less directly impacted, the integrity compromise could facilitate social engineering, misinformation campaigns, or operational disruptions. Availability impact is limited but possible if injected events cause server instability or force administrators to take systems offline for remediation. Organizations relying on Matrix for sensitive communications, especially in sectors like government, finance, or critical infrastructure, could face reputational damage or operational risks if exploited. Since the vulnerability requires federation to be enabled and interaction with remote homeservers, organizations with isolated or non-federated deployments are not at risk. The absence of known exploits reduces immediate threat but does not eliminate the risk, especially as threat actors may develop exploits over time.

Mitigation Recommendations

The primary mitigation is to upgrade all Dendrite homeserver instances to version 0.9.8 or later, where the signature verification flaw has been corrected. Organizations should audit their Matrix deployments to confirm the version in use and ensure timely patching. For environments where immediate upgrade is not feasible, temporarily disabling federation can eliminate the attack vector, though this reduces interoperability. Administrators should monitor federation logs for anomalous or unexpected event activity that could indicate attempted exploitation. Implementing network-level controls to restrict federation to trusted homeservers can reduce exposure. Additionally, organizations should review their incident response plans to include scenarios involving federated event tampering. Regular backups and integrity checks of critical communication data can aid recovery if an incident occurs. Finally, engaging with the Matrix community for updates and best practices will help maintain a secure deployment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-09-02T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9845c4522896dcbf3eb1

Added to database: 5/21/2025, 9:09:25 AM

Last enriched: 6/22/2025, 9:36:39 PM

Last updated: 8/15/2025, 2:39:25 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats