2025-07-01 22:03:49 +00:00

67 lines
1.9 KiB
JSON

{
"id": "CVE-2025-48930",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-28T17:15:25.553",
"lastModified": "2025-07-01T20:15:26.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"exclusively-hosted-service"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The TeleMessage service through 2025-05-05 stores certain cleartext information in memory, even though memory content may be accessible to an adversary through various avenues."
},
{
"lang": "es",
"value": "El servicio TeleMessage, hasta el 5 de mayo de 2025, almacena cierta informaci\u00f3n de texto claro en la memoria, aunque un adversario puede acceder a dicho contenido por diversas v\u00edas, como ocurri\u00f3 en mayo de 2025."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
"baseScore": 2.8,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.1,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-316"
}
]
}
],
"references": [
{
"url": "https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/",
"source": "cve@mitre.org"
}
]
}