Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32318: CWE-346: Origin Validation Error in cryptomator ios

0
High
Published: Fri Mar 20 2026 (03/20/2026, 18:27:22 UTC)
Source: CVE Database V5
Vendor/Project: cryptomator
Product: ios

Description

CVE-2026-32318 is a high-severity vulnerability affecting Cryptomator for iOS versions prior to 2. 8. 3. It involves an origin validation error where the client improperly trusts endpoints specified in the vault configuration file without verifying host authenticity. This flaw allows an attacker who can modify the vault. cryptomator file to tamper with the vault configuration, enabling a man-in-the-middle attack during the Hub key loading process. The attacker could exfiltrate authentication tokens by mixing legitimate and malicious API endpoints. The vulnerability requires the attacker to have the capability to alter the vault file and the user to unlock a Hub-backed vault using an affected client version. The issue has been patched in version 2. 8.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 19:37:32 UTC

Technical Analysis

Cryptomator for iOS provides client-side encryption for cloud-stored files, ensuring data confidentiality across platforms. Prior to version 2.8.3, a critical vulnerability (CVE-2026-32318) existed due to improper origin validation (CWE-346) in the vault configuration file handling. Specifically, the client trusted endpoints listed in the vault.cryptomator file without performing adequate host authenticity checks. This flaw allowed an attacker with the ability to modify the vault configuration file to inject malicious API endpoints alongside legitimate authentication endpoints. During the Hub key loading mechanism, this mixing of endpoints could facilitate a man-in-the-middle (MitM) attack, enabling token exfiltration and partial compromise of the authentication process. The vulnerability also relates to weaknesses in access control (CWE-354), improper authorization (CWE-451), and improper verification of cryptographic signatures or hashes (CWE-923). Exploitation requires the attacker to have write access to the vault.cryptomator file and the victim to unlock a Hub-backed vault using an affected client version. The vulnerability has been assigned a CVSS v3.1 score of 7.6 (high severity), reflecting its network attack vector, low attack complexity, requirement for privileges and user interaction, and significant confidentiality impact. The issue was patched in Cryptomator iOS version 2.8.3, which introduced proper host authenticity checks to prevent endpoint tampering.

Potential Impact

The vulnerability poses a significant risk to users of Cryptomator iOS clients prior to version 2.8.3, particularly those using Hub-backed vaults in environments where an attacker can modify the vault configuration file. Successful exploitation can lead to token exfiltration, undermining the confidentiality of encrypted data and potentially enabling unauthorized access to user vaults. This compromises the integrity of the authentication process and may facilitate further attacks on cloud-stored data. Organizations relying on Cryptomator for secure cloud file encryption could face data breaches, loss of trust, and compliance violations if attackers exploit this flaw. Since the attack requires modification of the vault file, environments with shared or compromised devices, or where attackers have local or network-level access to storage, are at higher risk. Although no known exploits are reported in the wild, the vulnerability's characteristics make it a credible threat in targeted attack scenarios.

Mitigation Recommendations

Organizations and users should immediately upgrade Cryptomator for iOS to version 2.8.3 or later to apply the official patch that enforces strict host authenticity validation for vault configuration endpoints. Additionally, users should ensure the integrity of their vault files by restricting write permissions to trusted users and devices only. Employing device-level security controls such as full disk encryption, secure boot, and endpoint protection can reduce the risk of unauthorized modification of vault files. Network segmentation and monitoring can help detect suspicious activities indicative of man-in-the-middle attacks. For environments with high security requirements, consider implementing additional integrity verification mechanisms for vault configuration files, such as cryptographic signatures or checksums verified out-of-band. Regularly auditing and reviewing access controls on cloud storage and local devices will further mitigate risks. Finally, educating users about the importance of applying updates promptly and recognizing suspicious behaviors during vault unlocking can enhance overall security posture.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-11T21:16:21.660Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bd97dde32a4fbe5fbf1afa

Added to database: 3/20/2026, 6:54:21 PM

Last enriched: 3/27/2026, 7:37:32 PM

Last updated: 5/1/2026, 7:59:55 AM

Views: 119

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses