Skip to main content

CVE-2022-41568: na in LINE Corporation LINE client for iOS

High
VulnerabilityCVE-2022-41568cvecve-2022-41568nacwe-400
Published: Tue Nov 29 2022 (11/29/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: LINE Corporation
Product: LINE client for iOS

Description

LINE client for iOS before 12.17.0 might be crashed by sharing an invalid shared key of e2ee in group chat.

AI-Powered Analysis

AILast updated: 06/22/2025, 05:07:52 UTC

Technical Analysis

CVE-2022-41568 is a high-severity vulnerability affecting the LINE client for iOS versions prior to 12.17.0. The issue arises from improper handling of an invalid shared key used in the end-to-end encryption (E2EE) mechanism within group chats. Specifically, when a malicious actor shares an invalid or malformed shared key in a group chat, it can cause the LINE client application on iOS devices to crash. This vulnerability is classified under CWE-400, which relates to uncontrolled resource consumption or denial of service conditions. The crash results in a denial of service (DoS) scenario where the affected application becomes unresponsive or terminates unexpectedly, disrupting communication for the user. The vulnerability can be triggered remotely without requiring any authentication or user interaction, as it only requires the victim to receive the invalid shared key in a group chat. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to availability, with no direct confidentiality or integrity compromise reported. No known exploits have been observed in the wild as of the published date, and no official patches or mitigation links were provided in the source information. The vulnerability was reserved on 2022-09-26 and publicly disclosed on 2022-11-29. Given the widespread use of LINE in certain regions, this vulnerability poses a significant risk to iOS users of the LINE client, particularly in group communication contexts where E2EE is utilized.

Potential Impact

For European organizations, the primary impact of CVE-2022-41568 is the potential disruption of communication channels relying on the LINE client for iOS. While LINE is not as dominant in Europe as in East Asia, it still has a user base among expatriates, international businesses, and specific communities. A successful exploitation could lead to denial of service conditions, causing the LINE app to crash repeatedly, thereby interrupting group communications. This disruption could affect business continuity, especially for organizations that rely on LINE for internal or external communications. Although the vulnerability does not compromise confidentiality or integrity, the loss of availability can hinder timely information exchange and coordination. Additionally, repeated crashes may lead to user frustration and potential loss of trust in the communication platform. For organizations with BYOD policies or employees using LINE on iOS devices, this vulnerability could indirectly impact operational efficiency. There is no indication that this vulnerability could be leveraged for privilege escalation or data exfiltration, limiting its impact to service availability.

Mitigation Recommendations

To mitigate the risk posed by CVE-2022-41568, European organizations should take the following specific actions: 1) Ensure all iOS devices running the LINE client are updated to version 12.17.0 or later, where the vulnerability is addressed. Since no patch links were provided in the source, organizations should verify updates directly through the official LINE app store listings or vendor communications. 2) Implement mobile device management (MDM) solutions to enforce app update policies and prevent the use of vulnerable app versions. 3) Educate users about the risk of receiving suspicious or unexpected shared keys in group chats and encourage reporting of any abnormal app behavior. 4) Temporarily restrict or monitor group chats where unknown participants can share encryption keys until devices are updated. 5) For critical communication channels, consider alternative secure messaging platforms with robust update mechanisms and proven security track records. 6) Monitor network traffic for unusual patterns that could indicate attempts to exploit this vulnerability, such as repeated delivery of malformed shared keys. 7) Coordinate with LINE Corporation support channels to obtain official patches or advisories and apply them promptly. These targeted steps go beyond generic advice by focusing on update enforcement, user awareness specific to E2EE key sharing, and monitoring group chat behaviors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
LINE
Date Reserved
2022-09-26T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d983ec4522896dcbf00e5

Added to database: 5/21/2025, 9:09:18 AM

Last enriched: 6/22/2025, 5:07:52 AM

Last updated: 8/1/2025, 12:27:12 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats