CVE-2026-32318
HIGHCryptomator for IOS: Tampered vault configuration allows MITM attack on Hub API
Title source: cnaDescription
Cryptomator for IOS offers multi-platform transparent client-side encryption for files in the cloud. Prior to version 2.8.3, an integrity check vulnerability allows an attacker tamper with the vault configuration file leading to a man-in-the-middle vulnerability in Hub key loading mechanism. Before this fix, the client trusted endpoints from the vault config without host authenticity checks, which could allow token exfiltration by mixing a legitimate auth endpoint with a malicious API endpoint. Impacted are users unlocking Hub-backed vaults with affected client versions in environments where an attacker can alter the vault.cryptomator file. This issue has been patched in version 2.8.3.
Scores
CVSS v3
7.6
EPSS
0.0001
EPSS Percentile
2.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-346
CWE-354
CWE-451
CWE-923
Status
published
Products (2)
cryptomator/cryptomator
< 2.8.2
cryptomator/ios
< 2.8.3
Published
Mar 20, 2026
Tracked Since
Mar 21, 2026