|Number of vulnerabilities||1|
|CWE ID|| CWE-451
|Public exploit||This vulnerability is being exploited in the wild.|
Telegram Desktop for Windows
Client/Desktop applications / Messaging software
This security advisory describes one medium risk vulnerability.
Exploit availability: Yes [Search exploit]Description
The vulnerability allows a remote attacker to perform spoofing attack.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
Note: this vulnerability has been exploited in the wild since March until October in 2017, according to Kaspersky Lab and was silently fixed by the vendor.
Update to the latest version. The vulnerability was reported to vendor in October 2017 and fixed afterwards.
It is unclear, in which version this vulnerability was fixed, however according to Kaspersky Lab statement and commits to the official GitHub repository, version 1.1.23 should be vulnerable to this issue.
Telegram Desktop for Windows: 1.1.23CPE
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.