CISA KEV 정보
| 취약점명 | TeleMessage TM SGNL Hidden Functionality Vulnerability |
|---|---|
| 설명 | TeleMessage TM SGNL contains a hidden functionality vulnerability in which the archiving backend holds cleartext copies of messages from TM SGNL application users. |
| 조치사항 | Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-912 |
| 등록일 (KEV) | 2025-05-12 |
| 조치 기한 | 2025-06-02 |
| 추가 참고 | Apply mitigations per vendor instructions. Absent mitigating instructions from the vendor, discontinue use of the product. ; https://nvd.nist.gov/vuln/detail/CVE-2025-47729 |
NVD 상세 정보
CVSS v3.1: 1.9 LOW
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N설명: The TeleMessage archiving backend through 2025-05-05 holds cleartext copies of messages from TM SGNL (aka Archive Signal) app users, which is different functionality than described in the TeleMessage "End-to-End encryption from the mobile phone through to the corporate archive" documentation, as exploited in the wild in May 2025.
CWE: CWE-912
참조
- https://arstechnica.com/security/2025/05/signal-clone-used-by-trump-official-stops-operations-after-report-it-was-hacked/ [Press/Media Coverage]
- https://news.ycombinator.com/item?id=43909220 [Press/Media Coverage]
- https://www.theregister.com/2025/05/05/telemessage_investigating/ [Press/Media Coverage]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-47729 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.