CVE-2025-47729

KEV
Published: Mag 08, 2025 Last Modified: Nov 05, 2025 EU-VD ID: EUVD-2025-14003
ExploitDB:
Other exploit source:
Google Dorks:
LOW 1,9
Attack Vector: local
Attack Complexity: high
Privileges Required: high
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: none
Availability: none

Description

AI Translation Available

The TeleMessage archiving backend through 2025-05-05 holds cleartext copies of messages from TM SGNL (aka Archive Signal) app users, which is different functionality than described in the TeleMessage 'End-to-End encryption from the mobile phone through to the corporate archive' documentation, as exploited in the wild in May 2025.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0215
Percentile
0,8th
Updated

EPSS Score Trend (Last 90 Days)

912

Hidden Functionality

Incomplete
Common Consequences
Security Scopes Affected:
Other Integrity
Potential Impacts:
Varies By Context Alter Execution Logic
Applicable Platforms
Technologies: Not Technology-Specific, ICS/OT
View CWE Details
Application

Text Message Archiver by Telemessage

Version Range Affected
To 2025-05-05 (inclusive)
cpe:2.3:a:telemessage:text_message_archiver:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025…
https://arstechnica.com/security/2025/05/signal-clone-used-by-trump-official-st…
https://news.ycombinator.com/item?id=43909220
https://www.theregister.com/2025/05/05/telemessage_investigating/