CVE-2026-33875

Gematik · Authenticator

Gematik Authenticator is vulnerable to authentication flow hijacking via malicious deep links, allowing attackers to impersonate victim users.

Executive summary

Gematik Authenticator users are at risk of identity theft and session hijacking if they click on malicious deep links, potentially compromising sensitive health data.

Vulnerability

The application is vulnerable to authentication flow hijacking. An unauthenticated attacker can craft a malicious deep link that, when clicked by a victim, redirects the authentication process to the attacker, allowing them to log in using the victim's identity.

Business impact

This vulnerability directly threatens the confidentiality of digital health records. A successful attack allows unauthorized access to sensitive medical information and identity impersonation within the German health infrastructure. The CVSS score of 9.3 reflects the critical impact on user privacy and the high potential for targeted phishing attacks.

Remediation

Immediate Action: Update Gematik Authenticator to version 4.16.0 or greater immediately.

Proactive Monitoring: Organizations should educate users on the risks of clicking unsolicited links, even those that appear to open legitimate local applications.

Compensating Controls: There are no known technical workarounds for this vulnerability; the software update is the only effective mitigation.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The update to version 4.16.0 is mandatory for all users of the Gematik Authenticator. Given the sensitive nature of the data protected by this application, administrators should verify that all managed devices have been updated to the patched version to prevent identity hijacking.