fkie_cve-2025-47729
Vulnerability from fkie_nvd
Published
2025-05-08 14:15
Modified
2025-05-14 13:12
Severity ?
1.9 (Low) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Summary
The TeleMessage archiving backend through 2025-05-05 holds cleartext copies of messages from TM SGNL (aka Archive Signal) app users, which is different functionality than described in the TeleMessage "End-to-End encryption from the mobile phone through to the corporate archive" documentation, as exploited in the wild in May 2025.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://arstechnica.com/security/2025/05/signal-clone-used-by-trump-official-stops-operations-after-report-it-was-hacked/ | Press/Media Coverage | |
cve@mitre.org | https://news.ycombinator.com/item?id=43909220 | Press/Media Coverage | |
cve@mitre.org | https://www.theregister.com/2025/05/05/telemessage_investigating/ | Press/Media Coverage |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
telemessage | text_message_archiver | * |
{ "cisaActionDue": "2025-06-02", "cisaExploitAdd": "2025-05-12", "cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "TeleMessage TM SGNL Hidden Functionality Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:telemessage:text_message_archiver:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E704BA3-25AB-4F8F-93DD-96A824FD0E85", "versionEndIncluding": "2025-05-05", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [ { "sourceIdentifier": "cve@mitre.org", "tags": [ "exclusively-hosted-service" ] } ], "descriptions": [ { "lang": "en", "value": "The TeleMessage archiving backend through 2025-05-05 holds cleartext copies of messages from TM SGNL (aka Archive Signal) app users, which is different functionality than described in the TeleMessage \"End-to-End encryption from the mobile phone through to the corporate archive\" documentation, as exploited in the wild in May 2025." }, { "lang": "es", "value": "El backend de archivo de TeleMessage hasta el 5 de mayo de 2025 contiene copias de texto sin formato de los mensajes de los usuarios de la aplicaci\u00f3n TM SGNL (tambi\u00e9n conocida como Archive Signal), lo que constituye una funcionalidad diferente a la descrita en la documentaci\u00f3n de TeleMessage \"Cifrado de extremo a extremo desde el tel\u00e9fono m\u00f3vil hasta el archivo corporativo\", tal como se explot\u00f3 en la naturaleza en mayo de 2025." } ], "id": "CVE-2025-47729", "lastModified": "2025-05-14T13:12:53.603", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 1.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.5, "impactScore": 1.4, "source": "cve@mitre.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-05-08T14:15:26.883", "references": [ { "source": "cve@mitre.org", "tags": [ "Press/Media Coverage" ], "url": "https://arstechnica.com/security/2025/05/signal-clone-used-by-trump-official-stops-operations-after-report-it-was-hacked/" }, { "source": "cve@mitre.org", "tags": [ "Press/Media Coverage" ], "url": "https://news.ycombinator.com/item?id=43909220" }, { "source": "cve@mitre.org", "tags": [ "Press/Media Coverage" ], "url": "https://www.theregister.com/2025/05/05/telemessage_investigating/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-912" } ], "source": "cve@mitre.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…