First published: Sun Mar 24 2019(Updated: )
Open Whisper Signal (aka Signal-Desktop) through 1.23.1 and the Signal Private Messenger application through 4.35.3 for Android are vulnerable to an IDN homograph attack when displaying messages containing URLs. This occurs because the application produces a clickable link even if (for example) Latin and Cyrillic characters exist in the same domain name, and the available font has an identical representation of characters from different alphabets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Signal Private Messenger Android | <=4.35.3 | |
Signal Signal-desktop | <=1.23.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-9970 is a vulnerability in Open Whisper Signal (aka Signal-Desktop) through 1.23.1 and the Signal Private Messenger application through 4.35.3 for Android that exposes users to an IDN homograph attack when displaying messages containing URLs.
CVE-2019-9970 affects Signal Private Messenger for Android versions up to and including 4.35.3.
CVE-2019-9970 affects Signal-Desktop versions up to and including 1.23.1.
An IDN homograph attack is a type of phishing attack where an attacker uses visually similar characters to create a fake website that appears identical to the legitimate one.
At the moment, there are no known fixes for CVE-2019-9970. It is recommended to exercise caution when clicking on URLs in Signal messages.