First published: Mon Jan 23 2023(Updated: )
** DISPUTED ** Signal Desktop before 6.2.0 on Windows, Linux, and macOS allows an attacker to obtain potentially sensitive attachments sent in messages from the attachments.noindex directory. Cached attachments are not effectively cleared. In some cases, even after a self-initiated file deletion, an attacker can still recover the file if it was previously replied to in a conversation. (Local filesystem access is needed by the attacker.) NOTE: the vendor disputes the relevance of this finding because the product is not intended to protect against adversaries with this degree of local access.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Signal Signal-desktop | <=6.2.0 | |
Apple macOS | ||
Linux Linux kernel | ||
Microsoft Windows | ||
All of | ||
Signal Signal-desktop | <=6.2.0 | |
Any of | ||
Apple macOS | ||
Linux Linux kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-24069.
The severity of CVE-2023-24069 is low (3.3).
Signal Desktop versions before 6.2.0 on Windows, Linux, and macOS are affected.
An attacker can exploit CVE-2023-24069 to obtain potentially sensitive attachments sent in messages from the attachments.noindex directory.
Yes, updating Signal Desktop to version 6.2.0 or later will fix CVE-2023-24069.