CVE-2018-15542
low-risk
Published 2018-10-09
An issue was discovered in the org.telegram.messenger application 4.8.11 for Android. The Passcode feature allows authentication bypass via runtime manipulation that forces a certain method's return value to true. In other words, an attacker could authenticate with an arbitrary passcode. NOTE: the vendor indicates that this is not an attack of interest within the context of their threat model, which excludes Android devices on which rooting has occurred
Do I need to act?
-
0.05% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.4/10
Medium
PHYSICAL
/ HIGH complexity
Affected Products (1)
Affected Vendors
References (2)
Third Party Advisory
https://gist.github.com/tanprathan/18d0f692a2485acfb5693e2f6dabeb5d
Third Party Advisory
https://gist.github.com/tanprathan/18d0f692a2485acfb5693e2f6dabeb5d
22
/ 100
low-risk
Severity
17/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal