First published: Tue Feb 11 2025(Updated: )
An issue in the SharedConfig class of Telegram Android APK v.11.7.0 allows a physically proximate attacker to bypass authentication and escalate privileges by manipulating the return value of the checkPasscode method.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Telegram |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity level of CVE-2024-54916 is classified as high due to the potential for privilege escalation.
To mitigate CVE-2024-54916, update the Telegram Android APK to the latest version where the issue is resolved.
CVE-2024-54916 affects users of the Telegram Android APK version 11.7.0.
A physically proximate attacker can exploit CVE-2024-54916 by manipulating the return value of the checkPasscode method.
The impact of CVE-2024-54916 allows an attacker to bypass authentication and escalate privileges within the Telegram app.