CVE-2022-28345

7.5 HIGH

📋 TL;DR

This vulnerability in Signal for iOS allows attackers to spoof URLs using Right-to-Left Override (RTLO) characters combined with non-breaking spaces and hash characters. Attackers can create malicious links that appear to be legitimate websites (like example.com) but actually redirect to malicious destinations. Users of Signal for iOS before version 5.34 are affected.

💻 Affected Systems

Products:
  • Signal for iOS
Versions: All versions before 5.34
Operating Systems: iOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to send messages with specially crafted URLs containing RTLO characters and specific subdomains.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be tricked into visiting malicious websites that steal credentials, install malware, or conduct financial fraud through convincing phishing attacks.

🟠

Likely Case

Successful phishing campaigns where users click spoofed links thinking they're visiting legitimate websites, potentially leading to credential theft.

🟢

If Mitigated

Users remain suspicious of all links and verify destinations before clicking, limiting successful phishing attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires sending messages to target users. Public proof-of-concept tools like RIUS demonstrate the technique.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.34 and later

Vendor Advisory: https://github.com/signalapp/Signal-iOS/releases

Restart Required: No

Instructions:

1. Open the App Store on iOS device 2. Search for Signal 3. Update to version 5.34 or higher 4. No restart required

🔧 Temporary Workarounds

Disable automatic URL rendering

ios

Configure Signal to not automatically render URLs in messages

User education

all

Train users to hover over links before clicking and verify URL destinations

🧯 If You Can't Patch

  • Implement email/web filtering to block messages containing RTLO characters in URLs
  • Deploy endpoint protection that warns users about potentially spoofed URLs

🔍 How to Verify

Check if Vulnerable:

Check Signal version in iOS Settings > Signal > Version. If below 5.34, vulnerable.

Check Version:

Not applicable - check via iOS Settings app

Verify Fix Applied:

Confirm Signal version is 5.34 or higher in iOS Settings > Signal > Version.

📡 Detection & Monitoring

Log Indicators:

  • Messages containing URLs with RTLO characters (U+202E)
  • URLs with unusual subdomains like gepj, txt, fdp, xcod

Network Indicators:

  • Unusual redirect patterns from Signal messages
  • Connections to unexpected domains following Signal links

SIEM Query:

search 'U+202E' OR 'RTLO' OR 'right-to-left override' in message logs

🔗 References

📤 Share & Export