CVE-2024-42027

6.7 MEDIUM

📋 TL;DR

Rocket.Chat Mobile apps before version 4.5.1 generate weak end-to-end encryption (E2EE) passwords with insufficient entropy, making them vulnerable to brute-force attacks. Attackers who can capture encrypted communications could potentially decrypt them given enough time and computational resources. This affects all users of vulnerable Rocket.Chat Mobile applications.

💻 Affected Systems

Products:
  • Rocket.Chat Mobile
Versions: All versions prior to 4.5.1
Operating Systems: Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the mobile applications, not the Rocket.Chat server itself. Vulnerability exists when E2EE is enabled in mobile apps.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers decrypt sensitive end-to-end encrypted communications, exposing private messages, files, and confidential business discussions.

🟠

Likely Case

Targeted attacks against high-value individuals or organizations where attackers invest resources to crack weak encryption keys.

🟢

If Mitigated

Limited exposure if strong network controls prevent interception of encrypted traffic or if alternative secure communication channels are used.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to capture encrypted communications and significant computational resources for brute-force attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.5.1

Vendor Advisory: https://hackerone.com/reports/2546437

Restart Required: Yes

Instructions:

1. Update Rocket.Chat Mobile app to version 4.5.1 or later from official app stores. 2. Ensure all mobile clients are updated. 3. Consider regenerating E2EE keys after update for maximum security.

🔧 Temporary Workarounds

Disable E2EE on Mobile

all

Temporarily disable end-to-end encryption in Rocket.Chat Mobile settings until patched

Use Web/Desktop Clients

all

Use Rocket.Chat web or desktop clients instead of mobile apps for sensitive communications

🧯 If You Can't Patch

  • Disable end-to-end encryption feature in mobile app settings
  • Implement network monitoring to detect unusual traffic patterns or brute-force attempts

🔍 How to Verify

Check if Vulnerable:

Check Rocket.Chat Mobile app version in settings. If version is below 4.5.1 and E2EE is enabled, the system is vulnerable.

Check Version:

Check app version in Settings > About or similar menu within Rocket.Chat Mobile app

Verify Fix Applied:

Confirm app version is 4.5.1 or higher in app settings. Verify E2EE functionality works normally.

📡 Detection & Monitoring

Log Indicators:

  • Unusual failed decryption attempts
  • Multiple connection attempts from same source

Network Indicators:

  • Unusual volume of encrypted traffic to/from mobile devices
  • Patterns suggesting brute-force attacks

SIEM Query:

source="rocketchat" AND (event_type="authentication_failure" OR event_type="decryption_error")

🔗 References

📤 Share & Export