Home

Description

The TeleMessage archiving backend through 2025-05-05 holds cleartext copies of messages from TM SGNL (aka Archive Signal) app users, which is different functionality than described in the TeleMessage "End-to-End encryption from the mobile phone through to the corporate archive" documentation, as exploited in the wild in May 2025.

PUBLISHED Reserved 2025-05-08 | Published 2025-05-08 | Updated 2025-10-21 | Assigner mitre




LOW: 1.9CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N

CISA Known Exploited Vulnerability

Date added 2025-05-12 | Due date 2025-06-02

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Problem types

CWE-912 Hidden Functionality

Product status

Default status
unknown

Any version
affected

References

www.cisa.gov/...erabilities-catalog?field_cve=CVE-2025-47729 government-resource

news.ycombinator.com/item?id=43909220

arstechnica.com/...ps-operations-after-report-it-was-hacked/

www.theregister.com/2025/05/05/telemessage_investigating/

cve.org (CVE-2025-47729)

nvd.nist.gov (CVE-2025-47729)

Download JSON