CVE-2025-48929
- EPSS 0.04%
- Veröffentlicht 28.05.2025 17:15:25
- Zuletzt bearbeitet 22.10.2025 15:01:11
The TeleMessage service through 2025-05-05 implements authentication through a long-lived credential (e.g., not a token with a short expiration time) that can be reused at a later date if discovered by an adversary.
CVE-2025-48930
- EPSS 0.02%
- Veröffentlicht 28.05.2025 17:15:25
- Zuletzt bearbeitet 22.10.2025 14:43:34
The TeleMessage service through 2025-05-05 stores certain cleartext information in memory, even though memory content may be accessible to an adversary through various avenues.
CVE-2025-48931
- EPSS 0.01%
- Veröffentlicht 28.05.2025 17:15:25
- Zuletzt bearbeitet 03.10.2025 14:32:57
The TeleMessage service through 2025-05-05 relies on MD5 for password hashing, which opens up various attack possibilities (including rainbow tables) with low computational effort.
CVE-2025-48925
- EPSS 0.05%
- Veröffentlicht 28.05.2025 00:00:00
- Zuletzt bearbeitet 22.10.2025 15:14:34
The TeleMessage service through 2025-05-05 relies on the client side (e.g., the TM SGNL app) to do MD5 hashing, and then accepts the hash as the authentication credential.
CVE-2025-48926
- EPSS 0.09%
- Veröffentlicht 28.05.2025 00:00:00
- Zuletzt bearbeitet 22.10.2025 15:02:13
The admin panel in the TeleMessage service through 2025-05-05 allows attackers to discover usernames, e-mail addresses, passwords, and telephone numbers.
CVE-2025-48927
- EPSS 4.68%
- Veröffentlicht 28.05.2025 00:00:00
- Zuletzt bearbeitet 05.11.2025 19:26:13
The TeleMessage service through 2025-05-05 configures Spring Boot Actuator with an exposed heap dump endpoint at a /heapdump URI, as exploited in the wild in May 2025.
- EPSS 5.11%
- Veröffentlicht 28.05.2025 00:00:00
- Zuletzt bearbeitet 05.11.2025 19:25:52
The TeleMessage service through 2025-05-05 is based on a JSP application in which the heap content is roughly equivalent to a "core dump" in which a password previously sent over HTTP would be included in this dump, as exploited in the wild in May 20...
CVE-2025-47730
- EPSS 0.16%
- Veröffentlicht 08.05.2025 00:00:00
- Zuletzt bearbeitet 22.10.2025 14:53:23
The TeleMessage archiving backend through 2025-05-05 accepts API calls (to request an authentication token) from the TM SGNL (aka Archive Signal) app with the credentials of logfile for the user and enRR8UVVywXYbFkqU#QDPRkO for the password.