Vulnerability Description
Cryptomator for IOS offers multi-platform transparent client-side encryption for files in the cloud. Prior to version 2.8.3, an integrity check vulnerability allows an attacker tamper with the vault configuration file leading to a man-in-the-middle vulnerability in Hub key loading mechanism. Before this fix, the client trusted endpoints from the vault config without host authenticity checks, which could allow token exfiltration by mixing a legitimate auth endpoint with a malicious API endpoint. Impacted are users unlocking Hub-backed vaults with affected client versions in environments where an attacker can alter the vault.cryptomator file. This issue has been patched in version 2.8.3.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cryptomator | Cryptomator | <= 2.8.2 |
| Apple | Iphone Os | All versions |
Related Weaknesses (CWE)
References
- https://github.com/cryptomator/ios/commit/98c31280304af65c0932eb547d5fe4be2d1692Patch
- https://github.com/cryptomator/ios/pull/444Issue Tracking
- https://github.com/cryptomator/ios/releases/tag/2.8.3Release Notes
- https://github.com/cryptomator/ios/security/advisories/GHSA-g7fr-c82r-hm6jVendor Advisory
FAQ
What is CVE-2026-32318?
CVE-2026-32318 is a vulnerability with a CVSS score of 7.6 (HIGH). Cryptomator for IOS offers multi-platform transparent client-side encryption for files in the cloud. Prior to version 2.8.3, an integrity check vulnerability allows an attacker tamper with the vault c...
How severe is CVE-2026-32318?
CVE-2026-32318 has been rated HIGH with a CVSS base score of 7.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-32318?
Check the references section above for vendor advisories and patch information. Affected products include: Cryptomator Cryptomator, Apple Iphone Os.