Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45192: n/a

0
Medium
VulnerabilityCVE-2024-45192cvecve-2024-45192
Published: Thu Aug 22 2024 (08/22/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Matrix libolm through 3.2.16. Cache-timing attacks can occur due to use of base64 when decoding group session keys. This refers to the libolm implementation of Olm. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 06:55:11 UTC

Technical Analysis

CVE-2024-45192 identifies a vulnerability in the Matrix libolm cryptographic library, specifically in versions up to 3.2.16. The flaw arises from the use of base64 decoding when handling group session keys, which introduces a side-channel attack vector through cache-timing analysis. Cache-timing attacks exploit variations in the time taken by the system to perform cryptographic operations, potentially allowing an attacker to infer secret key material. In this case, the base64 decoding process leaks timing information that can be measured remotely, enabling an attacker with network access and low privileges to recover sensitive group session keys. These keys are critical for decrypting group communications in Matrix’s end-to-end encryption scheme. The vulnerability does not affect the integrity or availability of the system but compromises confidentiality. Notably, this issue only impacts products that are no longer supported by the libolm maintainers, meaning no official patches or updates are provided. The CVSS v3.1 score is 5.3 (medium), reflecting the network attack vector, required low privileges, no user interaction, and high confidentiality impact. There are no known exploits in the wild, and the vulnerability was published on August 22, 2024. The CWE associated is CWE-385 (Use of Cryptographically Weak Pseudo-Random Number Generator). Given the lack of patch availability, mitigation relies on operational controls or migration to supported versions.

Potential Impact

The primary impact of CVE-2024-45192 is the potential disclosure of sensitive cryptographic group session keys used in Matrix end-to-end encrypted group chats. This compromises the confidentiality of group communications, allowing attackers to decrypt messages and potentially gather sensitive information. Since the vulnerability does not affect integrity or availability, the system’s operation and message authenticity remain intact. The requirement for network access and low privileges lowers the barrier for exploitation, but the complexity of performing cache-timing attacks remotely may limit widespread abuse. The fact that only unsupported products are affected reduces the overall risk to the broader user base but poses a significant threat to organizations that continue to use legacy or unmaintained Matrix implementations. Such organizations may face data breaches, loss of privacy, and exposure of confidential communications. The absence of patches means that affected entities must rely on alternative mitigations or migration, increasing operational risk. The medium severity rating reflects these factors.

Mitigation Recommendations

Since no official patches are available for this vulnerability in unsupported libolm versions, organizations should prioritize migrating to supported versions of libolm or alternative cryptographic libraries that do not exhibit this timing side-channel. If migration is not immediately feasible, network-level mitigations such as isolating affected systems, restricting access to trusted networks, and monitoring for unusual traffic patterns can reduce exposure. Implementing constant-time cryptographic operations or using hardened base64 decoding routines in custom forks may mitigate timing leakage but requires expert development effort. Additionally, organizations should audit their use of Matrix-based encrypted messaging to identify legacy deployments and plan decommissioning or upgrades. Employing end-to-end encryption solutions with active maintenance and security support is critical. Regular security assessments and penetration testing focusing on side-channel vulnerabilities can help detect similar issues early. Finally, educating developers and administrators about side-channel risks and secure coding practices will reduce future vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-22T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ceab7ef31ef0b56a2be

Added to database: 2/25/2026, 9:43:06 PM

Last enriched: 2/28/2026, 6:55:11 AM

Last updated: 4/12/2026, 9:10:30 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses