File Type Spoofing Vulnerability in Telegram Desktop
CVE-2020-17448

7.8HIGH

Key Information:

Vendor

Telegram

Vendor
CVE Published:
11 August 2020

What is CVE-2020-17448?

Telegram Desktop versions up to 2.1.13 contain a vulnerability that allows an attacker to exploit the Dangerous File Type Execution protection mechanism. By using a chat interface to send a file with a name that lacks an extension, an attacker can trick the application into executing a potentially harmful file. This vulnerability compromises the intended security measures, posing risks to users by facilitating unauthorized actions.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.