CVE-2020-25824
low-risk
Published 2020-10-14
Telegram Desktop through 2.4.3 does not require passcode entry upon pushing the Export key within the Export Telegram Data wizard. The threat model is a victim who has voluntarily opened Export Wizard but is then distracted. An attacker then approaches the unattended desktop and pushes the Export key. This attacker may consequently gain access to all chat conversation and media files.
Do I need to act?
-
0.18% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
2
CVSS 2.4/10
Low
PHYSICAL
/ LOW complexity
Affected Products (1)
Telegram Desktop
Affected Vendors
References (8)
Third Party Advisory
https://github.com/soheilsamanabadi/vulnerability/blob/main/Telegram-Desktop-CVE...
Third Party Advisory
https://security.gentoo.org/glsa/202101-34
Product
https://www.Telegram.org
Third Party Advisory
https://github.com/soheilsamanabadi/vulnerability/blob/main/Telegram-Desktop-CVE...
Third Party Advisory
https://security.gentoo.org/glsa/202101-34
Product
https://www.Telegram.org
16
/ 100
low-risk
Severity
10/34 · Low
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal