Rakuten Viber Cloak mode in Android v25.7.2.0g and Windows v25.6.0.0–v25.8.1.0 uses a static and predictable TLS ClientHello fingerprint lacking extension diversity, allowing Deep Packet Inspection (DPI) systems to trivially identify and block proxy traffic, undermining censorship circumvention. (CWE-327)
Metrics
Affected Vendors & Products
References
History
Fri, 06 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rakuten Viber
Rakuten Viber rakuten Viber Cloak - Android Rakuten Viber rakuten Viber Cloak - Windows |
|
| Vendors & Products |
Rakuten Viber
Rakuten Viber rakuten Viber Cloak - Android Rakuten Viber rakuten Viber Cloak - Windows |
Fri, 06 Mar 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 05 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 05 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Rakuten Viber Cloak mode in Android v25.7.2.0g and Windows v25.6.0.0–v25.8.1.0 uses a static and predictable TLS ClientHello fingerprint lacking extension diversity, allowing Deep Packet Inspection (DPI) systems to trivially identify and block proxy traffic, undermining censorship circumvention. (CWE-327) | |
| Title | Rakuten Viber uses broken or risky cryptographic Algorithm | |
| References |
|
Status: PUBLISHED
Assigner: certcc
Published: 2026-03-05T16:53:32.465Z
Updated: 2026-03-06T10:36:09.154Z
Reserved: 2025-11-20T12:38:19.605Z
Link: CVE-2025-13476
Updated: 2026-03-05T18:35:24.559Z
Status : Awaiting Analysis
Published: 2026-03-05T19:15:58.283
Modified: 2026-03-06T11:16:07.157
Link: CVE-2025-13476
No data.