Password Hashing Vulnerability in TeleMessage Service by TeleMessage
CVE-2025-48931
3.2LOW
What is CVE-2025-48931?
The TeleMessage service, up until May 5, 2025, employs MD5 for password hashing, which is outdated and susceptible to various attack vectors. An attacker can exploit this weakness through methods like rainbow table attacks, which require minimal computational resources, thereby posing a significant threat to user security and data integrity.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
service 0 <= 2025-05-05
References
CVSS V3.1
Score:
3.2
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
