CVE-2025-13524 is a privacy-impacting flaw in AWS Wickr, Wickr Gov and Wickr Enterprise desktop clients where, under certain user actions, the audio stream can remain open after the user closes the call window. AWS reports that this issue could result in the affected user’s microphone audio continuing to stream to other call participants until they drop the call, the user joins another call, or the user terminates the application. While not a traditional RCE or injection vulnerability, the bug undermines expectations of end-to-end encrypted calling confidentiality and maps to MITRE ATT&CK T1110 (Credential and Sensitive Data Exposure) analogues for data-in-use leaks. The vulnerability impacts desktop Wickr clients (Windows, macOS and Linux) prior to version 6.62.13 across AWS Wickr, Wickr Gov and Wickr Enterprise offerings. The issue manifests only in specific call flows where the user takes a particular action inside the app—details AWS does not fully disclose—but the net effect is that users may mistakenly believe a call has ended while their audio continues to be transmitted. This edge-case behavior introduces risk for sensitive discussions, especially in government and regulated industries that rely on Wickr Gov and Wickr Enterprise for high-security communications. From a business perspective, accidental audio leakage can expose confidential strategy discussions, incident response coordination, legal conversations or personal data handled in regulated environments. Unlike typical network eavesdropping, this leak occurs inside an end-to-end encrypted context, meaning participants on the call remain the only recipients—but that still includes any untrusted or compromised party present in the session. In settings covered by GDPR, HIPAA or contractual NDAs, such inadvertent disclosure could carry compliance and reputational consequences. AWS has addressed CVE-2025-13524 in Wickr desktop version 6.62.13 and recommends customers upgrade to the latest release. There are no workarounds beyond software update and user behavior, so organizations should rapidly roll out new clients, particularly in sensitive environments, and reinforce guidance that users should properly terminate sessions and exit the application after high-risk meetings. Security teams should also revisit policies around which conversations should or should not involve external participants, even when held over encrypted collaboration platforms.
🎯CORTEX Protocol Intelligence Assessment
Business Impact: CVE-2025-13524 creates the potential for inadvertent exposure of sensitive voice conversations in organizations that rely on AWS Wickr for secure communications, including government and enterprise environments. Although the leak is limited to other call participants, it may still violate confidentiality expectations and regulatory obligations if those participants are external or later compromised. Technical Context: The bug resides in audio session management logic in Wickr desktop clients, where certain user actions cause audio streaming to persist despite the UI indicating the call has ended. AWS has remediated the issue in version 6.62.13 across AWS Wickr, Wickr Gov and Wickr Enterprise, and reports no workarounds beyond upgrading clients and ensuring proper call termination behavior.
⚡Strategic Intelligence Guidance
- Immediately upgrade all AWS Wickr, Wickr Gov and Wickr Enterprise desktop clients to version 6.62.13 or later, prioritizing systems used by executives, legal, incident response and government stakeholders.
- Update collaboration and secure-communications policies to instruct users to fully terminate calls and exit Wickr clients after highly sensitive meetings, particularly when external parties are present.
- Review data classification and meeting guidelines to determine which discussions should be restricted to internal-only participants even when using end-to-end encrypted platforms.
- Incorporate communication platform CVEs like CVE-2025-13524 into regular patch management cycles and security briefings, emphasizing that privacy-impacting bugs can be as consequential as traditional code-execution flaws.
Vendors
Amazon Web ServicesAWS Wickr
Threats
Call audio leakagePrivacy exposure
Targets
Government agenciesEnterprises using Wickr GovSecure collaboration users