CVE-2018-15542

An issue was discovered in the org.telegram.messenger application 4.8.11 for Android. The Passcode feature allows authentication bypass via runtime manipulation that forces a certain method's return value to true. In other words, an attacker could authenticate with an arbitrary passcode. NOTE: the vendor indicates that this is not an attack of interest within the context of their threat model, which excludes Android devices on which rooting has occurred
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:telegram:telegram:4.8.11:*:*:*:*:android:*:*

History

07 Nov 2023, 02:53

Type Values Removed Values Added
Summary ** DISPUTED ** An issue was discovered in the org.telegram.messenger application 4.8.11 for Android. The Passcode feature allows authentication bypass via runtime manipulation that forces a certain method's return value to true. In other words, an attacker could authenticate with an arbitrary passcode. NOTE: the vendor indicates that this is not an attack of interest within the context of their threat model, which excludes Android devices on which rooting has occurred. An issue was discovered in the org.telegram.messenger application 4.8.11 for Android. The Passcode feature allows authentication bypass via runtime manipulation that forces a certain method's return value to true. In other words, an attacker could authenticate with an arbitrary passcode. NOTE: the vendor indicates that this is not an attack of interest within the context of their threat model, which excludes Android devices on which rooting has occurred

Information

Published : 2018-10-09 17:29

Updated : 2024-04-11 01:00


NVD link : CVE-2018-15542

Mitre link : CVE-2018-15542

CVE.ORG link : CVE-2018-15542


JSON object : View

Products Affected

telegram

  • telegram
CWE
CWE-287

Improper Authentication