CVE-2025-13476: CWE-327 Use of a Broken or Risky Cryptographic Algorithm in Rakuten Viber Rakuten Viber Cloak - Android
Rakuten Viber Cloak mode in Android v25.7.2.0g and Windows v25.6.0.0–v25.8.1.0 uses a static and predictable TLS ClientHello fingerprint lacking extension diversity, allowing Deep Packet Inspection (DPI) systems to trivially identify and block proxy traffic, undermining censorship circumvention. (CWE-327)
AI Analysis
Technical Summary
CVE-2025-13476 identifies a cryptographic vulnerability in Rakuten Viber Cloak mode versions 25.7.2.0g on Android and 25.6.0.0 through 25.8.1.0 on Windows. The vulnerability arises from the use of a static and predictable TLS ClientHello fingerprint that lacks extension diversity, violating best practices for cryptographic protocol design (CWE-327 and CWE-693). TLS ClientHello messages typically include extensions that help obfuscate traffic patterns and make it harder for DPI systems to fingerprint and block proxy or circumvention traffic. However, Viber Cloak mode's static fingerprint allows DPI systems to trivially identify proxy traffic, enabling censorship mechanisms to block or throttle it effectively. This undermines the primary purpose of the Cloak mode, which is to provide users with a means to bypass network censorship and surveillance. The vulnerability does not involve a direct cryptographic algorithm weakness but rather the implementation and protocol fingerprinting aspect, which is critical in evading detection. No CVSS score has been assigned yet, and no known exploits are reported in the wild, but the predictable fingerprint makes exploitation straightforward for network-level adversaries. The vulnerability affects a widely used messaging and proxy tool, impacting users in censored environments who rely on Viber Cloak for secure and private communication. The lack of patch availability at the time of publication means users remain exposed. This vulnerability highlights the importance of dynamic and diverse TLS fingerprints in circumvention tools to resist DPI-based blocking.
Potential Impact
The primary impact of CVE-2025-13476 is the degradation of censorship circumvention capabilities for users relying on Rakuten Viber Cloak mode. Network adversaries employing DPI can easily identify and block proxy traffic due to the static TLS ClientHello fingerprint, leading to denial of access to Viber Cloak services. This affects user confidentiality and availability by preventing secure and private communications in censored or surveilled environments. Organizations and individuals in countries with strict internet censorship may find their ability to bypass restrictions severely impaired, potentially exposing them to surveillance or limiting access to critical information. The vulnerability also undermines trust in Viber Cloak as a reliable circumvention tool, potentially pushing users to less secure alternatives. While no direct compromise of cryptographic keys or data integrity is indicated, the ability to block traffic at the network level represents a significant availability and confidentiality risk. The scope includes all users of the affected versions on Android and Windows platforms, which are widely deployed. The ease of exploitation by DPI systems without requiring authentication or user interaction increases the threat level. Overall, this vulnerability threatens the fundamental purpose of the Cloak mode and could have serious implications for freedom of information and privacy in restrictive regimes.
Mitigation Recommendations
Since no official patch is currently available for CVE-2025-13476, users and organizations should consider immediate mitigation steps: 1) Avoid using the affected versions of Rakuten Viber Cloak mode on Android and Windows until a patch is released. 2) Employ alternative circumvention tools or VPN services that implement dynamic and diverse TLS fingerprints to evade DPI detection. 3) Network defenders should monitor outgoing TLS ClientHello fingerprints for static or predictable patterns indicative of this vulnerability and apply traffic shaping or blocking rules accordingly to detect misuse. 4) Encourage Rakuten Viber to implement randomized or diversified TLS ClientHello fingerprints and support modern TLS extensions to resist DPI fingerprinting. 5) Use obfuscation or pluggable transport mechanisms that mask or randomize protocol fingerprints. 6) Educate users in censored regions about the risks of relying on vulnerable circumvention tools and promote best practices for secure communication. 7) Collaborate with threat intelligence communities to share detection signatures and updates related to this vulnerability. These steps help reduce exposure and maintain circumvention capabilities until an official fix is deployed.
Affected Countries
Russia, China, Iran, Turkey, Egypt, United Arab Emirates, Saudi Arabia, Belarus, Vietnam, Ethiopia, Pakistan, North Korea
CVE-2025-13476: CWE-327 Use of a Broken or Risky Cryptographic Algorithm in Rakuten Viber Rakuten Viber Cloak - Android
Description
Rakuten Viber Cloak mode in Android v25.7.2.0g and Windows v25.6.0.0–v25.8.1.0 uses a static and predictable TLS ClientHello fingerprint lacking extension diversity, allowing Deep Packet Inspection (DPI) systems to trivially identify and block proxy traffic, undermining censorship circumvention. (CWE-327)
AI-Powered Analysis
Technical Analysis
CVE-2025-13476 identifies a cryptographic vulnerability in Rakuten Viber Cloak mode versions 25.7.2.0g on Android and 25.6.0.0 through 25.8.1.0 on Windows. The vulnerability arises from the use of a static and predictable TLS ClientHello fingerprint that lacks extension diversity, violating best practices for cryptographic protocol design (CWE-327 and CWE-693). TLS ClientHello messages typically include extensions that help obfuscate traffic patterns and make it harder for DPI systems to fingerprint and block proxy or circumvention traffic. However, Viber Cloak mode's static fingerprint allows DPI systems to trivially identify proxy traffic, enabling censorship mechanisms to block or throttle it effectively. This undermines the primary purpose of the Cloak mode, which is to provide users with a means to bypass network censorship and surveillance. The vulnerability does not involve a direct cryptographic algorithm weakness but rather the implementation and protocol fingerprinting aspect, which is critical in evading detection. No CVSS score has been assigned yet, and no known exploits are reported in the wild, but the predictable fingerprint makes exploitation straightforward for network-level adversaries. The vulnerability affects a widely used messaging and proxy tool, impacting users in censored environments who rely on Viber Cloak for secure and private communication. The lack of patch availability at the time of publication means users remain exposed. This vulnerability highlights the importance of dynamic and diverse TLS fingerprints in circumvention tools to resist DPI-based blocking.
Potential Impact
The primary impact of CVE-2025-13476 is the degradation of censorship circumvention capabilities for users relying on Rakuten Viber Cloak mode. Network adversaries employing DPI can easily identify and block proxy traffic due to the static TLS ClientHello fingerprint, leading to denial of access to Viber Cloak services. This affects user confidentiality and availability by preventing secure and private communications in censored or surveilled environments. Organizations and individuals in countries with strict internet censorship may find their ability to bypass restrictions severely impaired, potentially exposing them to surveillance or limiting access to critical information. The vulnerability also undermines trust in Viber Cloak as a reliable circumvention tool, potentially pushing users to less secure alternatives. While no direct compromise of cryptographic keys or data integrity is indicated, the ability to block traffic at the network level represents a significant availability and confidentiality risk. The scope includes all users of the affected versions on Android and Windows platforms, which are widely deployed. The ease of exploitation by DPI systems without requiring authentication or user interaction increases the threat level. Overall, this vulnerability threatens the fundamental purpose of the Cloak mode and could have serious implications for freedom of information and privacy in restrictive regimes.
Mitigation Recommendations
Since no official patch is currently available for CVE-2025-13476, users and organizations should consider immediate mitigation steps: 1) Avoid using the affected versions of Rakuten Viber Cloak mode on Android and Windows until a patch is released. 2) Employ alternative circumvention tools or VPN services that implement dynamic and diverse TLS fingerprints to evade DPI detection. 3) Network defenders should monitor outgoing TLS ClientHello fingerprints for static or predictable patterns indicative of this vulnerability and apply traffic shaping or blocking rules accordingly to detect misuse. 4) Encourage Rakuten Viber to implement randomized or diversified TLS ClientHello fingerprints and support modern TLS extensions to resist DPI fingerprinting. 5) Use obfuscation or pluggable transport mechanisms that mask or randomize protocol fingerprints. 6) Educate users in censored regions about the risks of relying on vulnerable circumvention tools and promote best practices for secure communication. 7) Collaborate with threat intelligence communities to share detection signatures and updates related to this vulnerability. These steps help reduce exposure and maintain circumvention capabilities until an official fix is deployed.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- certcc
- Date Reserved
- 2025-11-20T12:38:19.605Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69a9c994460e1c85df139316
Added to database: 3/5/2026, 6:21:08 PM
Last enriched: 3/5/2026, 6:38:59 PM
Last updated: 3/5/2026, 10:35:40 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.