CVE-2025-24904

8.5 HIGH

📋 TL;DR

CVE-2025-24904 is a vulnerability in libsignal-service-rs that allows servers or malicious clients to inject plaintext content envelopes, potentially bypassing end-to-end encryption and authentication. This affects applications using vulnerable versions of the libsignal-service-rs library to communicate with Signal servers. The vulnerability could compromise the confidentiality and integrity of supposedly encrypted communications.

💻 Affected Systems

Products:
  • libsignal-service-rs
Versions: All versions prior to commit 82d70f6720e762898f34ae76b0894b0297d9b2f8
Operating Systems: All platforms using Rust
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any application using the vulnerable libsignal-service-rs library to communicate with Signal servers.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could intercept and read supposedly encrypted messages, inject malicious content, or impersonate legitimate users in Signal-based communication systems.

🟠

Likely Case

Malicious servers or compromised clients could bypass encryption protections to read or manipulate message content in applications using this library.

🟢

If Mitigated

With proper patching, the encryption and authentication mechanisms function as intended, preventing unauthorized access to message content.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires either server access or ability to act as a malicious client. The vulnerability involves injection of plaintext envelopes that bypass encryption checks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Commit 82d70f6720e762898f34ae76b0894b0297d9b2f8

Vendor Advisory: https://github.com/whisperfish/libsignal-service-rs/security/advisories/GHSA-hrrc-wpfw-5hj2

Restart Required: No

Instructions:

1. Update libsignal-service-rs to include commit 82d70f6720e762898f34ae76b0894b0297d9b2f8
2. Update your Cargo.toml to reference the patched version
3. Rebuild your application with the updated dependency
4. Note: The fix adds a 'was_encrypted' field to the Metadata struct, which may require code updates due to API changes.

🔧 Temporary Workarounds

No known workarounds

all

The advisory states no known workarounds are available. Patching is the only mitigation.

🧯 If You Can't Patch

  • Isolate affected systems from untrusted networks
  • Monitor for unusual traffic patterns or unexpected plaintext in encrypted channels

🔍 How to Verify

Check if Vulnerable:

Check if your libsignal-service-rs dependency version includes commit 82d70f6720e762898f34ae76b0894b0297d9b2f8. If not, you are vulnerable.

Check Version:

cargo tree | grep libsignal-service-rs

Verify Fix Applied:

Verify that your application uses libsignal-service-rs with commit 82d70f6720e762898f34ae76b0894b0297d9b2f8 or later, and that the Metadata struct includes the 'was_encrypted' field.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected plaintext content in supposedly encrypted channels
  • Authentication failures or bypasses in Signal protocol communications

Network Indicators:

  • Unencrypted or improperly encrypted traffic to/from Signal servers
  • Injection of plaintext envelopes in encrypted streams

SIEM Query:

Search for: 'libsignal-service-rs' AND ('plaintext injection' OR 'encryption bypass' OR 'CVE-2025-24904')

🔗 References

📤 Share & Export