Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2018-25022
Analyzed
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-13 Dec, 2021 | 01:15
Updated At-08 Feb, 2022 | 18:55

The Onion module in toxcore before 0.2.2 doesn't restrict which packets can be onion-routed, which allows a remote attacker to discover a target user's IP address (when knowing only their Tox Id) by positioning themselves close to target's Tox Id in the DHT for the target to establish an onion connection with the attacker, guessing the target's DHT public key and creating a DHT node with public key close to it, and finally onion-routing a NAT Ping Request to the target, requesting it to ping the just created DHT node.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.13.1LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
CPE Matches

toktok
toktok
>>toxcore>>Versions before 0.2.2(exclusive)
cpe:2.3:a:toktok:toxcore:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-200Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://blog.tox.chat/2018/04/security-vulnerability-and-new-toxcore-releasecve@mitre.org
Exploit
Vendor Advisory
https://github.com/TokTok/c-toxcore/issues/873cve@mitre.org
Exploit
Issue Tracking
Third Party Advisory
https://github.com/TokTok/c-toxcore/pull/872cve@mitre.org
Patch
Third Party Advisory
Change History
0Changes found

Details not found