CVE-2024-36289

5.3 MEDIUM

📋 TL;DR

This vulnerability in FreeFrom - the nostr client allows man-in-the-middle attackers to manipulate direct message content when users reuse nonces and key pairs in encryption. It affects Android and iOS users running versions prior to 1.3.5. Attackers could potentially alter DM content without detection.

💻 Affected Systems

Products:
  • FreeFrom - the nostr client
Versions: Versions prior to 1.3.5
Operating Systems: Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default. The vulnerability exists in the encryption implementation for direct messages.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could manipulate sensitive direct message content, potentially leading to misinformation, social engineering attacks, or manipulation of private communications between users.

🟠

Likely Case

In real-world scenarios, attackers on the same network could intercept and modify direct messages between users, potentially altering the meaning of conversations or inserting malicious content.

🟢

If Mitigated

With proper encryption key management and nonce usage, direct messages remain confidential and tamper-proof between intended parties.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires man-in-the-middle position and knowledge of the encryption flaw. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.5

Vendor Advisory: https://jvn.jp/en/jp/JVN55045256/

Restart Required: Yes

Instructions:

1. Open Google Play Store or Apple App Store. 2. Search for 'FreeFrom - the nostr client'. 3. Check if update to version 1.3.5 is available. 4. Tap 'Update' to install the patched version. 5. Restart the application after update completes.

🔧 Temporary Workarounds

Avoid untrusted networks

all

Prevent man-in-the-middle attacks by avoiding public Wi-Fi and untrusted networks when using the app.

Use VPN

all

Employ a reputable VPN service to encrypt network traffic and prevent interception.

🧯 If You Can't Patch

  • Discontinue use of direct messaging feature in the app until patched
  • Use alternative secure messaging platforms for sensitive communications

🔍 How to Verify

Check if Vulnerable:

Check app version in settings: Android: Settings > Apps > FreeFrom > App info. iOS: Settings > General > iPhone Storage > FreeFrom.

Check Version:

Not applicable - check via app store or device settings

Verify Fix Applied:

Confirm app version is 1.3.5 or higher in app settings or app store listing.

📡 Detection & Monitoring

Log Indicators:

  • Unusual network activity patterns
  • Failed encryption handshakes
  • Unexpected message modification alerts

Network Indicators:

  • Man-in-the-middle attack patterns
  • Unusual traffic interception on port 443/HTTPS
  • SSL/TLS anomalies

SIEM Query:

Not specifically applicable for mobile app vulnerability

🔗 References

📤 Share & Export