Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2021-32755
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Certificate pinning is not enforced on the web socket connection
Source: NVD (National Vulnerability Database)
Vulnerability Description
Wire is a collaboration platform. wire-ios-transport handles authentication of requests, network failures, and retries for the iOS implementation of Wire. In the 3.82 version of the iOS application, a new web socket implementation was introduced for users running iOS 13 or higher. This new websocket implementation is not configured to enforce certificate pinning when available. Certificate pinning for the new websocket is enforced in version 3.84 or above.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
证书验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Wire 信任管理问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Wire是个人开发者的一款聊天软件。该软件支持 Web、WindowsiOS、Android、OS X 平台,有群组功能,可以语音通话,发送照片以及其独创性的打招呼方式 PING。 Wire 存在安全漏洞,该漏洞源于Wire - iOS -transport处理Wire的iOS实现的请求认证、网络失败和重试,在iOS应用程序的3.82版本中,为运行iOS 13或更高版本的用户引入了一个新的web套接字实现,这个新的websocket实现没有配置为在可用时强制证书固定。攻击者可利用该漏洞使新websocke
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
wireappwire-ios-transport = 3.8.2 -
II. Public POCs for CVE-2021-32755
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2021-32755
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2021-32755

No comments yet


Leave a comment