CVE-2021-21400

7.1 HIGH

📋 TL;DR

This vulnerability in wire-webapp (Wire's frontend) causes the app-lock passphrase to be unintentionally sent to the most recently used chat when the user types without actively focusing the input field. This exposes sensitive authentication credentials to unintended recipients. All users of wire-webapp before version 2021-03-15-production.0 are affected.

💻 Affected Systems

Products:
  • wire-webapp
Versions: All versions before 2021-03-15-production.0
Operating Systems: All platforms running wire-webapp
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments where app-lock feature is used.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

App-lock passphrase is sent to unauthorized chat participants, potentially allowing them to bypass app security and access sensitive communications.

🟠

Likely Case

Accidental passphrase disclosure to trusted contacts in recent chats, compromising app-lock security.

🟢

If Mitigated

No passphrase leakage when proper input focus is enforced.

🌐 Internet-Facing: MEDIUM - Requires user interaction and specific conditions, but exposes sensitive credentials.
🏢 Internal Only: MEDIUM - Same exposure risk regardless of deployment location.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Occurs naturally when user types passphrase without proper focus.

Exploitation requires user to be entering app-lock passphrase and have recent chat activity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2021-03-15-production.0

Vendor Advisory: https://github.com/wireapp/wire-webapp/security/advisories/GHSA-cxwr-f2j3-q8hp

Restart Required: Yes

Instructions:

1. Update wire-webapp to version 2021-03-15-production.0 or later. 2. Restart the application. 3. Verify the fix by checking version.

🔧 Temporary Workarounds

Manual Input Focus

all

Ensure input field is actively focused before typing app-lock passphrase.

Disable App-Lock

all

Temporarily disable app-lock feature until patched.

🧯 If You Can't Patch

  • Disable app-lock feature completely
  • Implement strict user training on manually focusing input fields before typing passphrases

🔍 How to Verify

Check if Vulnerable:

Check wire-webapp version - if earlier than 2021-03-15-production.0, it's vulnerable.

Check Version:

Check application settings or about page for version information.

Verify Fix Applied:

Confirm version is 2021-03-15-production.0 or later and test app-lock passphrase entry.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected passphrase strings in chat logs
  • App-lock authentication failures

Network Indicators:

  • Passphrase strings transmitted in chat traffic

SIEM Query:

Search for patterns matching passphrases in chat/communication logs.

🔗 References

📤 Share & Export