CVE-2026-32318: CWE-346: Origin Validation Error in cryptomator ios
CVE-2026-32318 is a high-severity vulnerability affecting Cryptomator for iOS versions prior to 2. 8. 3. It involves an origin validation error where the client improperly trusts endpoints specified in the vault configuration file without verifying host authenticity. This flaw allows an attacker who can modify the vault. cryptomator file to tamper with the vault configuration, enabling a man-in-the-middle attack during the Hub key loading process. The attacker could exfiltrate authentication tokens by mixing legitimate and malicious API endpoints. The vulnerability requires the attacker to have the capability to alter the vault file and the user to unlock a Hub-backed vault using an affected client version. The issue has been patched in version 2. 8.
AI Analysis
Technical Summary
Cryptomator for iOS provides client-side encryption for cloud-stored files, ensuring data confidentiality across platforms. Prior to version 2.8.3, a critical vulnerability (CVE-2026-32318) existed due to improper origin validation (CWE-346) in the vault configuration file handling. Specifically, the client trusted endpoints listed in the vault.cryptomator file without performing adequate host authenticity checks. This flaw allowed an attacker with the ability to modify the vault configuration file to inject malicious API endpoints alongside legitimate authentication endpoints. During the Hub key loading mechanism, this mixing of endpoints could facilitate a man-in-the-middle (MitM) attack, enabling token exfiltration and partial compromise of the authentication process. The vulnerability also relates to weaknesses in access control (CWE-354), improper authorization (CWE-451), and improper verification of cryptographic signatures or hashes (CWE-923). Exploitation requires the attacker to have write access to the vault.cryptomator file and the victim to unlock a Hub-backed vault using an affected client version. The vulnerability has been assigned a CVSS v3.1 score of 7.6 (high severity), reflecting its network attack vector, low attack complexity, requirement for privileges and user interaction, and significant confidentiality impact. The issue was patched in Cryptomator iOS version 2.8.3, which introduced proper host authenticity checks to prevent endpoint tampering.
Potential Impact
The vulnerability poses a significant risk to users of Cryptomator iOS clients prior to version 2.8.3, particularly those using Hub-backed vaults in environments where an attacker can modify the vault configuration file. Successful exploitation can lead to token exfiltration, undermining the confidentiality of encrypted data and potentially enabling unauthorized access to user vaults. This compromises the integrity of the authentication process and may facilitate further attacks on cloud-stored data. Organizations relying on Cryptomator for secure cloud file encryption could face data breaches, loss of trust, and compliance violations if attackers exploit this flaw. Since the attack requires modification of the vault file, environments with shared or compromised devices, or where attackers have local or network-level access to storage, are at higher risk. Although no known exploits are reported in the wild, the vulnerability's characteristics make it a credible threat in targeted attack scenarios.
Mitigation Recommendations
Organizations and users should immediately upgrade Cryptomator for iOS to version 2.8.3 or later to apply the official patch that enforces strict host authenticity validation for vault configuration endpoints. Additionally, users should ensure the integrity of their vault files by restricting write permissions to trusted users and devices only. Employing device-level security controls such as full disk encryption, secure boot, and endpoint protection can reduce the risk of unauthorized modification of vault files. Network segmentation and monitoring can help detect suspicious activities indicative of man-in-the-middle attacks. For environments with high security requirements, consider implementing additional integrity verification mechanisms for vault configuration files, such as cryptographic signatures or checksums verified out-of-band. Regularly auditing and reviewing access controls on cloud storage and local devices will further mitigate risks. Finally, educating users about the importance of applying updates promptly and recognizing suspicious behaviors during vault unlocking can enhance overall security posture.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Switzerland, Japan, South Korea
CVE-2026-32318: CWE-346: Origin Validation Error in cryptomator ios
Description
CVE-2026-32318 is a high-severity vulnerability affecting Cryptomator for iOS versions prior to 2. 8. 3. It involves an origin validation error where the client improperly trusts endpoints specified in the vault configuration file without verifying host authenticity. This flaw allows an attacker who can modify the vault. cryptomator file to tamper with the vault configuration, enabling a man-in-the-middle attack during the Hub key loading process. The attacker could exfiltrate authentication tokens by mixing legitimate and malicious API endpoints. The vulnerability requires the attacker to have the capability to alter the vault file and the user to unlock a Hub-backed vault using an affected client version. The issue has been patched in version 2. 8.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Cryptomator for iOS provides client-side encryption for cloud-stored files, ensuring data confidentiality across platforms. Prior to version 2.8.3, a critical vulnerability (CVE-2026-32318) existed due to improper origin validation (CWE-346) in the vault configuration file handling. Specifically, the client trusted endpoints listed in the vault.cryptomator file without performing adequate host authenticity checks. This flaw allowed an attacker with the ability to modify the vault configuration file to inject malicious API endpoints alongside legitimate authentication endpoints. During the Hub key loading mechanism, this mixing of endpoints could facilitate a man-in-the-middle (MitM) attack, enabling token exfiltration and partial compromise of the authentication process. The vulnerability also relates to weaknesses in access control (CWE-354), improper authorization (CWE-451), and improper verification of cryptographic signatures or hashes (CWE-923). Exploitation requires the attacker to have write access to the vault.cryptomator file and the victim to unlock a Hub-backed vault using an affected client version. The vulnerability has been assigned a CVSS v3.1 score of 7.6 (high severity), reflecting its network attack vector, low attack complexity, requirement for privileges and user interaction, and significant confidentiality impact. The issue was patched in Cryptomator iOS version 2.8.3, which introduced proper host authenticity checks to prevent endpoint tampering.
Potential Impact
The vulnerability poses a significant risk to users of Cryptomator iOS clients prior to version 2.8.3, particularly those using Hub-backed vaults in environments where an attacker can modify the vault configuration file. Successful exploitation can lead to token exfiltration, undermining the confidentiality of encrypted data and potentially enabling unauthorized access to user vaults. This compromises the integrity of the authentication process and may facilitate further attacks on cloud-stored data. Organizations relying on Cryptomator for secure cloud file encryption could face data breaches, loss of trust, and compliance violations if attackers exploit this flaw. Since the attack requires modification of the vault file, environments with shared or compromised devices, or where attackers have local or network-level access to storage, are at higher risk. Although no known exploits are reported in the wild, the vulnerability's characteristics make it a credible threat in targeted attack scenarios.
Mitigation Recommendations
Organizations and users should immediately upgrade Cryptomator for iOS to version 2.8.3 or later to apply the official patch that enforces strict host authenticity validation for vault configuration endpoints. Additionally, users should ensure the integrity of their vault files by restricting write permissions to trusted users and devices only. Employing device-level security controls such as full disk encryption, secure boot, and endpoint protection can reduce the risk of unauthorized modification of vault files. Network segmentation and monitoring can help detect suspicious activities indicative of man-in-the-middle attacks. For environments with high security requirements, consider implementing additional integrity verification mechanisms for vault configuration files, such as cryptographic signatures or checksums verified out-of-band. Regularly auditing and reviewing access controls on cloud storage and local devices will further mitigate risks. Finally, educating users about the importance of applying updates promptly and recognizing suspicious behaviors during vault unlocking can enhance overall security posture.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-11T21:16:21.660Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69bd97dde32a4fbe5fbf1afa
Added to database: 3/20/2026, 6:54:21 PM
Last enriched: 3/27/2026, 7:37:32 PM
Last updated: 5/1/2026, 7:59:55 AM
Views: 119
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.