CVE-2025-13476

Published: Mar 05, 2026 Last Modified: Mar 10, 2026
ExploitDB:
Other exploit source:
Google Dorks:
CRITICAL 9,8
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high

Description

AI Translation Available

Rakuten Viber Cloak mode in Android v25.7.2.0g and Windows v25.6.0.0–v25.8.1.0 uses a static and predictable TLS ClientHello fingerprint lacking extension diversity, allowing Deep Packet Inspection (DPI) systems to trivially identify and block proxy traffic, undermining censorship circumvention. (CWE-327)

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0005
Percentile
0,2th
Updated

EPSS Score Trend (Last 11 Days)

327

Use of a Broken or Risky Cryptographic Algorithm

Draft
Common Consequences
Security Scopes Affected:
Confidentiality Integrity Accountability Non-Repudiation
Potential Impacts:
Read Application Data Modify Application Data Hide Activities
Applicable Platforms
Languages: Not Language-Specific, Verilog, VHDL
Technologies: Not Technology-Specific, ICS/OT
View CWE Details
Application

Viber by Rakuten

cpe:2.3:a:rakuten:viber:9.3.0.6:25.7.2.0g:*:*:*:android:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Viber by Rakuten

Version Range Affected
From 25.6.0 (inclusive)
To 25.8.1.0 (inclusive)
cpe:2.3:a:rakuten:viber:*:*:*:*:*:windows:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.kb.cert.org/vuls/id/772695
https://www.viber.com/en/download/