CVE-2025-47729
low-risk
Published 2025-05-08
The TeleMessage archiving backend through 2025-05-05 holds cleartext copies of messages from TM SGNL (aka Archive Signal) app users, which is different functionality than described in the TeleMessage "End-to-End encryption from the mobile phone through to the corporate archive" documentation, as exploited in the wild in May 2025.
Do I need to act?
~
4.1% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
1
CVSS 1.9/10
Low
LOCAL
/ HIGH complexity
Affected Products (1)
Affected Vendors
References (4)
Press/Media Coverage
https://arstechnica.com/security/2025/05/signal-clone-used-by-trump-official-sto...
Press/Media Coverage
https://news.ycombinator.com/item?id=43909220
Press/Media Coverage
https://www.theregister.com/2025/05/05/telemessage_investigating/
US Government Resource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-...
24
/ 100
low-risk
Severity
5/34 · Minimal
Exploitability
14/34 · Moderate
Exposure
5/34 · Minimal