HomeTelegramCVE-2020-25824

CVE-2020-25824

LOW
2.4CVSS
Published: 2020-10-14
Updated: 2024-11-21
AI Analysis

Description

Telegram Desktop through 2.4.3 does not require passcode entry upon pushing the Export key within the Export Telegram Data wizard. The threat model is a victim who has voluntarily opened Export Wizard but is then distracted. An attacker then approaches the unattended desktop and pushes the Export key. This attacker may consequently gain access to all chat conversation and media files.

CVSS Metrics

Vector
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack Vector
physical
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
low
Integrity
none
Availability
none
Weaknesses
CWE-306

Metadata

Primary Vendor
TELEGRAM
Published
10/14/2020
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

telegram : telegram_desktop

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2020-25824 | LOW Severity | CVEDatabase.com | CVEDatabase.com