Cyber Posture

CVE-2025-24904

High

Published: 13 February 2025

Published
13 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N
EPSS Score 0.0002 5.5th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may alter data en route to storage or other systems in order to manipulate external outcomes or hide activity, thus threatening the integrity of the data.

Security Summary

CVE-2025-24904 affects libsignal-service-rs, a Rust implementation of the libsignal-service-java library used for core communication with Signal servers. Prior to commit 82d70f6720e762898f34ae76b0894b0297d9b2f8, the library is vulnerable to injection of plaintext content envelopes by a server or malicious client, potentially bypassing end-to-end encryption and authentication mechanisms. This flaw is classified under CWE-74 and CWE-287, with a CVSS v3.1 base score of 8.5 (AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N).

A malicious client with low privileges or a compromised Signal server can exploit this over the network with low complexity and no user interaction, achieving high-impact integrity violations alongside low confidentiality impact. Attackers could inject unauthorized plaintext envelopes into communications, undermining the protocol's security guarantees by evading encryption and authentication checks.

The vulnerability is fixed in commit 82d70f6720e762898f34ae76b0894b0297d9b2f8, which adds a `was_encrypted` field to the `Metadata` struct; this change breaks the API but is described as easily resolvable. No known workarounds exist, per the GitHub security advisory (GHSA-hrrc-wpfw-5hj2).

Details

CWE(s)
CWE-74CWE-287

MITRE ATT&CK Enterprise Techniques

T1557 Adversary-in-the-Middle Credential Access
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.
T1565.002 Transmitted Data Manipulation Impact
Adversaries may alter data en route to storage or other systems in order to manipulate external outcomes or hide activity, thus threatening the integrity of the data.
Why these techniques?

Vulnerability allows server or malicious client to inject plaintext envelopes bypassing E2EE/authentication, directly facilitating traffic injection in MITM position (T1557) and manipulation of transmitted data (T1565.002).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References