Data Export Weakness in Telegram Desktop by Telegram
CVE-2020-25824
2.4LOW
What is CVE-2020-25824?
Telegram Desktop versions up to 2.4.3 have a vulnerability where the Export key within the Export Telegram Data wizard does not require passcode entry. This allows an attacker to exploit a scenario where an unsuspecting user opens the Export Wizard but becomes distracted. If the desktop is left unattended, an attacker can simply press the Export key, potentially gaining unrestricted access to all chat conversations and media files. This vulnerability highlights the importance of securing sensitive actions within software to prevent unauthorized data access.
References
CVSS V3.1
Score:
2.4
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Physical
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
