First published: Tue Oct 09 2018(Updated: )
** DISPUTED ** An issue was discovered in the org.telegram.messenger application 4.8.11 for Android. The FingerprintManager class for Biometric validation allows authentication bypass through the callback method from onAuthenticationFailed to onAuthenticationSucceeded with null, because the fingerprint API in conjunction with the Android keyGenerator class is not implemented. In other words, an attacker could authenticate with an arbitrary fingerprint. NOTE: the vendor indicates that this is not an attack of interest within the context of their threat model, which excludes Android devices on which rooting has occurred.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Telegram Telegram | =4.8.11 | |
=4.8.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15543 is a vulnerability found in the org.telegram.messenger application 4.8.11 for Android that allows authentication bypass through the callback method from onAuthenticationFailed to onAuthenticationSucceeded with null.
CVE-2018-15543 has a severity rating of 6.8, which is considered medium.
CVE-2018-15543 affects the org.telegram.messenger application version 4.8.11 for Android.
At the moment, there is no official fix or patch available for CVE-2018-15543. It is recommended to monitor official sources for updates and apply the patch as soon as it becomes available.
CVE-2018-15543 is classified under Common Weakness Enumeration (CWE) category 287, which is Improper Authentication.