CVE-2022-26629
📋 TL;DR
This vulnerability allows attackers to bypass the lock screen security feature in SoroushPlus+ Messenger 1.0.30 due to insufficient access controls. It affects users of this specific version of the messenger app, potentially exposing private messages and data to unauthorized access.
💻 Affected Systems
- SoroushPlus+ Messenger
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An attacker gains unauthorized access to the app, viewing or exfiltrating sensitive messages, contacts, and media, leading to privacy breaches or data theft.
Likely Case
Local attackers or malware bypass the lock screen to access the app's contents without user consent, compromising user privacy.
If Mitigated
With proper patching, the lock screen functions as intended, preventing unauthorized access and maintaining data confidentiality.
🎯 Exploit Status
Exploitation requires local access to the device; public proof-of-concept code is available, making it easy for attackers to leverage.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 1.0.30 (check app updates for latest)
Vendor Advisory: No official vendor advisory found; rely on community sources like GitHub.
Restart Required: Yes
Instructions:
1. Open the app store (Google Play or Apple App Store). 2. Search for SoroushPlus+ Messenger. 3. If an update is available, install it. 4. Restart the app to apply the fix.
🔧 Temporary Workarounds
Disable Lock Screen Feature
allTemporarily turn off the lock screen security in the app settings to remove the vulnerable component.
Open SoroushPlus+ Messenger > Settings > Security > Disable Lock Screen
🧯 If You Can't Patch
- Uninstall SoroushPlus+ Messenger and switch to a secure alternative.
- Enable device-level security measures like strong passwords or biometric locks to limit physical access.
🔍 How to Verify
Check if Vulnerable:
Check the app version in SoroushPlus+ Messenger settings; if it is 1.0.30, it is vulnerable.
Check Version:
In the app, go to Settings > About or App Info to view the version number.
Verify Fix Applied:
Update the app and confirm the version is no longer 1.0.30; test the lock screen feature to ensure it cannot be bypassed.
📡 Detection & Monitoring
Log Indicators:
- Unusual access patterns to the app without lock screen prompts, or failed lock screen attempts that succeed unexpectedly.
Network Indicators:
- None, as this is a local exploit without network activity.
SIEM Query:
Not applicable due to local nature; monitor device logs for app access anomalies if supported.