Cryptomator for Android offers multi-platform transparent client-side encryption for files in the cloud. Prior to version 1.12.3, an integrity check vulnerability allows an attacker tamper with the vault configuration file leading to a man-in-the-middle vulnerability in Hub key loading mechanism. Before this fix, the client trusted endpoints from the vault config without host authenticity checks, which could allow token exfiltration by mixing a legitimate auth endpoint with a malicious API endpoint. Impacted are users unlocking Hub-backed vaults with affected client versions in environments where an attacker can alter the vault.cryptomator file. This issue has been patched in version 1.12.3.
References
| Link | Resource |
|---|---|
| https://github.com/cryptomator/android/releases/tag/1.12.3 | Release Notes |
| https://github.com/cryptomator/android/security/advisories/GHSA-876q-q3mm-fcvj | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-03-20 19:16
Updated : 2026-03-26 13:56
NVD link : CVE-2026-32317
Mitre link : CVE-2026-32317
CVE.ORG link : CVE-2026-32317
JSON object : View
Products Affected
- android
cryptomator
- cryptomator
