CVE-2022-35932

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-35932
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-35932.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-35932
Aliases
  • GHSA-pf36-jvpv-4hwq
Published
2022-08-12T15:20:17Z
Modified
2025-11-28T04:44:07.459222Z
Severity
  • 3.5 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Missing rate limit when trying to join a password protected Nextcloud Talk conversation
Details

Nextcloud Talk is a video and audio conferencing app for Nextcloud. Prior to versions 12.2.7, 13.0.7, and 14.0.3, password protected conversations are susceptible to brute force attacks if the attacker has the link/conversation token. It is recommended that the Nextcloud Talk application is upgraded to 12.2.7, 13.0.7 or 14.0.3. There are currently no known workarounds available apart from not having password protected conversations.

Database specific
{
    "cwe_ids": [
        "CWE-359"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/35xxx/CVE-2022-35932.json"
}
References

Affected packages

Git / github.com/nextcloud/spreed

Affected ranges

Type
GIT
Repo
https://github.com/nextcloud/spreed
Events
Database specific
{
    "versions": [
        {
            "introduced": "12.2.0"
        },
        {
            "fixed": "12.2.7"
        }
    ]
}
Type
GIT
Repo
https://github.com/nextcloud/spreed
Events
Database specific
{
    "versions": [
        {
            "introduced": "13.0.0"
        },
        {
            "fixed": "13.0.7"
        }
    ]
}
Type
GIT
Repo
https://github.com/nextcloud/spreed
Events
Database specific
{
    "versions": [
        {
            "introduced": "14.0.0"
        },
        {
            "fixed": "14.0.3"
        }
    ]
}

Affected versions

v12.*

v12.2.0
v12.2.1
v12.2.2
v12.2.3
v12.2.4
v12.2.5
v12.2.6

v13.*

v13.0.0
v13.0.1
v13.0.1.1
v13.0.2
v13.0.3
v13.0.4
v13.0.5
v13.0.6

v14.*

v14.0.0
v14.0.1
v14.0.2