Rakuten Viber Cloak mode in Android v25.7.2.0g and Windows v25.6.0.0–v25.8.1.0 uses a static and predictable TLS ClientHello fingerprint lacking extension diversity, allowing Deep Packet Inspection (DPI) systems to trivially identify and block proxy traffic, undermining censorship circumvention. (CWE-327)
History

Thu, 05 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
References

Thu, 05 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Description Rakuten Viber Cloak mode in Android v25.7.2.0g and Windows v25.6.0.0–v25.8.1.0 uses a static and predictable TLS ClientHello fingerprint lacking extension diversity, allowing Deep Packet Inspection (DPI) systems to trivially identify and block proxy traffic, undermining censorship circumvention. (CWE-327)
Title Rakuten Viber uses broken or risky cryptographic Algorithm
References

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2026-03-05T18:35:24.559Z

Reserved: 2025-11-20T12:38:19.605Z

Link: CVE-2025-13476

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-05T19:15:58.283

Modified: 2026-03-05T19:38:33.877

Link: CVE-2025-13476

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.