CVE-2026-32317
Cryptomator for Android: Tampered vault configuration allows MITM attack on Hub API
Cryptomator for Android offers multi-platform transparent client-side encryption for files in the cloud. Prior to version 1.12.3, an integrity check vulnerability allows an attacker tamper with the vault configuration file leading to a man-in-the-middle vulnerability in Hub key loading mechanism. Before this fix, the client trusted endpoints from the vault config without host authenticity checks, which could allow token exfiltration by mixing a legitimate auth endpoint with a malicious API endpoint. Impacted are users unlocking Hub-backed vaults with affected client versions in environments where an attacker can alter the vault.cryptomator file. This issue has been patched in version 1.12.3.
| CWE | CWE-346 CWE-354 CWE-451 CWE-923 |
| Vendor | cryptomator |
| Product | android |
| Ecosystems | |
| Industries | TechnologyMobile |
| Published | Mar 20, 2026 |
| Last Updated | Mar 20, 2026 |
Get instant alerts for cryptomator android
Be the first to know when new high vulnerabilities affecting cryptomator android are published โ delivered to Slack, Telegram or Discord.
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N