Description
Telegram Desktop through 2.4.3 does not require passcode entry upon pushing the Export key within the Export Telegram Data wizard. The threat model is a victim who has voluntarily opened Export Wizard but is then distracted. An attacker then approaches the unattended desktop and pushes the Export key. This attacker may consequently gain access to all chat conversation and media files.
Published: 2020-10-14
Score: 2.4 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-18460 Telegram Desktop through 2.4.3 does not require passcode entry upon pushing the Export key within the Export Telegram Data wizard. The threat model is a victim who has voluntarily opened Export Wizard but is then distracted. An attacker then approaches the unattended desktop and pushes the Export key. This attacker may consequently gain access to all chat conversation and media files.
History

No history.

Subscriptions

Telegram Telegram Desktop
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T15:40:36.989Z

Reserved: 2020-09-23T00:00:00.000Z

Link: CVE-2020-25824

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-10-14T15:15:17.133

Modified: 2024-11-21T05:18:50.623

Link: CVE-2020-25824

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses