First published: Wed Oct 14 2020(Updated: )
Telegram Desktop through 2.4.3 does not require passcode entry upon pushing the Export key within the Export Telegram Data wizard. The threat model is a victim who has voluntarily opened Export Wizard but is then distracted. An attacker then approaches the unattended desktop and pushes the Export key. This attacker may consequently gain access to all chat conversation and media files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Telegram Telegram Desktop | <=2.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25824 is a vulnerability in Telegram Desktop through version 2.4.3 that allows an attacker to export data without requiring a passcode entry.
CVE-2020-25824 affects Telegram Desktop versions up to 2.4.3 by bypassing the passcode entry requirement in the Export Telegram Data wizard.
CVE-2020-25824 has a severity level of low.
To fix CVE-2020-25824, update your Telegram Desktop to a version higher than 2.4.3.
You can find additional information about CVE-2020-25824 in the following references: [1] [2] [3].