TROYANOSYVIRUS
Retour aux CVEs

CVE-2025-48928

MEDIUMCISA KEV
4.0

Description

The TeleMessage service through 2025-05-05 is based on a JSP application in which the heap content is roughly equivalent to a "core dump" in which a password previously sent over HTTP would be included in this dump, as exploited in the wild in May 2025.

Details CVE

Score CVSS v3.14.0
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Vecteur d'attaqueLOCAL
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie5/28/2025
Derniere modification11/5/2025
Sourcekev
Observations honeypot0

CISA KEV

FournisseurTeleMessage
ProduitTM SGNL
Nom vulnerabiliteTeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability
Date ajout KEV2025-07-01
Date limite remediation2025-07-22
Utilise dans ransomwareUnknown

Produits affectes

smarsh:telemessage

Faiblesses (CWE)

CWE-528CWE-552

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.