Should We Chat, Too? Security Analysis of WeChat’s MMTLS Encryption Protocol

MediaVideo

WeChat, with over 1.2 billion monthly active users, stands as the most popular messaging and social media platform in China and third globally. Instead of TLS, WeChat mainly uses a proprietary network encryption protocol called “MMTLS”. We performed the first public analysis of the security and privacy properties of MMTLS and found it to be a modified version of TLS 1.3, with many of the modifications that WeChat developers made to the cryptography introducing weaknesses.

We also discovered a second layer of encryption inside MMTLS which we refer to as “Business-layer encryption”. We analyzed the security and privacy of Business-layer encryption and found serious issues including metadata leak, forgeable integrity check signatures, potential AES-CBC padding oracle and Key, IV re-use in block cipher mode. These issues are not directly exploitable thanks to the protection of outer MMTLS encryption.

Finally, we hypothesize that WeChat’s double-layer encryption is a technical debt, and discuss the wider trend of Chinese apps rolling their own crypto.

By:
Pellaeon Lin | Researcher, Citizen Lab
Mona Wang | Researcher, Citizen Lab
Jeffrey Knockel | Senior Research Associate, Citizen Lab

Full Abstract and Presentation Materials:
https://www.blackhat.com/asia-25/briefings/schedule/#should-we-chat-too-security-analysis-of-wechats-mmtls-encryption-protocol-44148Black HatRead More