Telemessage

8 CVEs product

Monthly

CVE-2025-48931 LOW Monitor

The TeleMessage service through 2025-05-05 relies on MD5 for password hashing, which opens up various attack possibilities (including rainbow tables) with low computational effort. Rated low severity (CVSS 3.2), this vulnerability is no authentication required. No vendor patch available.

Information Disclosure Telemessage
NVD
CVSS 3.1
3.2
EPSS
0.0%
CVE-2025-48930 LOW Monitor

The TeleMessage service through 2025-05-05 stores certain cleartext information in memory, even though memory content may be accessible to an adversary through various avenues. Rated low severity (CVSS 2.8). No vendor patch available.

Information Disclosure Telemessage
NVD
CVSS 3.1
2.8
EPSS
0.1%
CVE-2025-48929 MEDIUM Monitor

The TeleMessage service through 2025-05-05 implements authentication through a long-lived credential (e.g., not a token with a short expiration time) that can be reused at a later date if discovered. Rated medium severity (CVSS 4.0), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Information Disclosure Telemessage
NVD
CVSS 3.1
4.0
EPSS
0.1%
CVE-2025-48928 MEDIUM KEV THREAT Act Now

The TeleMessage service through 2025-05-05 is based on a JSP application in which the heap content is roughly equivalent to a "core dump" in which a password previously sent over HTTP would be. Rated medium severity (CVSS 4.0), this vulnerability is no authentication required, low attack complexity. Actively exploited in the wild (cisa kev) and no vendor patch available.

Information Disclosure Telemessage
NVD
CVSS 3.1
4.0
EPSS
8.3%
CVE-2025-48927 MEDIUM KEV THREAT Act Now

The TeleMessage service through 2025-05-05 configures Spring Boot Actuator with an exposed heap dump endpoint at a /heapdump URI, as exploited in the wild in May 2025. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Actively exploited in the wild (cisa kev) and no vendor patch available.

Information Disclosure Java Telemessage
NVD
CVSS 3.1
5.3
EPSS
7.6%
CVE-2025-48926 MEDIUM Monitor

The admin panel in the TeleMessage service through 2025-05-05 allows attackers to discover usernames, e-mail addresses, passwords, and telephone numbers. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Telemessage
NVD
CVSS 3.1
4.3
EPSS
0.3%
CVE-2025-48925 MEDIUM Monitor

The TeleMessage service through 2025-05-05 relies on the client side (e.g., the TM SGNL app) to do MD5 hashing, and then accepts the hash as the authentication credential. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Telemessage
NVD
CVSS 3.1
4.3
EPSS
0.1%
CVE-2025-47730 MEDIUM This Month

The TeleMessage archiving backend through 2025-05-05 accepts API calls (to request an authentication token) from the TM SGNL (aka Archive Signal) app with the credentials of logfile for the user and. Rated medium severity (CVSS 4.8), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Authentication Bypass Telemessage
NVD GitHub
CVSS 3.1
4.8
EPSS
0.2%
CVE-2025-48931
EPSS 0% CVSS 3.2
LOW Monitor

The TeleMessage service through 2025-05-05 relies on MD5 for password hashing, which opens up various attack possibilities (including rainbow tables) with low computational effort. Rated low severity (CVSS 3.2), this vulnerability is no authentication required. No vendor patch available.

Information Disclosure Telemessage
NVD
CVE-2025-48930
EPSS 0% CVSS 2.8
LOW Monitor

The TeleMessage service through 2025-05-05 stores certain cleartext information in memory, even though memory content may be accessible to an adversary through various avenues. Rated low severity (CVSS 2.8). No vendor patch available.

Information Disclosure Telemessage
NVD
CVE-2025-48929
EPSS 0% CVSS 4.0
MEDIUM Monitor

The TeleMessage service through 2025-05-05 implements authentication through a long-lived credential (e.g., not a token with a short expiration time) that can be reused at a later date if discovered. Rated medium severity (CVSS 4.0), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Information Disclosure Telemessage
NVD
CVE-2025-48928
EPSS 8% CVSS 4.0
MEDIUM KEV THREAT Act Now

The TeleMessage service through 2025-05-05 is based on a JSP application in which the heap content is roughly equivalent to a "core dump" in which a password previously sent over HTTP would be. Rated medium severity (CVSS 4.0), this vulnerability is no authentication required, low attack complexity. Actively exploited in the wild (cisa kev) and no vendor patch available.

Information Disclosure Telemessage
NVD
CVE-2025-48927
EPSS 8% CVSS 5.3
MEDIUM KEV THREAT Act Now

The TeleMessage service through 2025-05-05 configures Spring Boot Actuator with an exposed heap dump endpoint at a /heapdump URI, as exploited in the wild in May 2025. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Actively exploited in the wild (cisa kev) and no vendor patch available.

Information Disclosure Java Telemessage
NVD
CVE-2025-48926
EPSS 0% CVSS 4.3
MEDIUM Monitor

The admin panel in the TeleMessage service through 2025-05-05 allows attackers to discover usernames, e-mail addresses, passwords, and telephone numbers. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Telemessage
NVD
CVE-2025-48925
EPSS 0% CVSS 4.3
MEDIUM Monitor

The TeleMessage service through 2025-05-05 relies on the client side (e.g., the TM SGNL app) to do MD5 hashing, and then accepts the hash as the authentication credential. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Telemessage
NVD
CVE-2025-47730
EPSS 0% CVSS 4.8
MEDIUM This Month

The TeleMessage archiving backend through 2025-05-05 accepts API calls (to request an authentication token) from the TM SGNL (aka Archive Signal) app with the credentials of logfile for the user and. Rated medium severity (CVSS 4.8), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Authentication Bypass Telemessage
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy