VulnerabilitiesCRITICAL

Telegram Zero-Day - Alleged Flaw Allows Device Takeover

Featured image for Telegram Zero-Day - Alleged Flaw Allows Device Takeover
SASecurity Affairs
ZDI-CAN-30207Telegramremote code executionzero-dayTrendAI
🎯

Basically, there's a flaw in Telegram that could let hackers take over your device without you doing anything.

Quick Summary

A critical vulnerability in Telegram could allow hackers to take over devices without user interaction. Telegram denies the existence of this flaw, raising concerns for millions of users. With no patch available, the risk remains high. Stay alert and protect your device until a solution is found.

The Flaw

A newly disclosed Telegram vulnerability, tracked as ZDI-CAN-30207, poses a serious threat to user security. This flaw has a CVSS score of 9.8, indicating its critical nature. It allows attackers to execute code on targeted devices without any user interaction, simply by sending a malicious animated sticker. This zero-click exploit takes advantage of how Telegram processes media to generate previews, making it particularly dangerous.

The vulnerability affects Telegram on Android and Linux platforms. If successfully exploited, it grants attackers full control over the device, leading to potential data theft or further exploitation. The security community is on high alert, especially since no patch is currently available to mitigate this risk.

What's at Risk

The implications of this vulnerability are vast. With millions of users relying on Telegram for communication, a successful attack could lead to widespread device takeovers. The potential for exploitation in the wild raises concerns, as threat actors could quickly weaponize this flaw. The Zero Day Initiative has withheld technical details to give Telegram time to address the issue, but the lack of a patch leaves users vulnerable.

Telegram's denial of the vulnerability adds another layer of complexity. The company claims that all stickers are validated server-side, making it impossible for malicious files to be used as attack vectors. However, the cybersecurity community remains skeptical, given the severity of the reported flaw.

Patch Status

As of now, Telegram has not released any patches for this vulnerability. The Zero Day Initiative has set a deadline for Telegram to address the issue by July 24, 2026. Until then, users are left exposed to potential attacks. The Italian National Cybersecurity Agency (ACN) has reported Telegram's denial of the existence of this zero-click vulnerability, but the ongoing discussions suggest that the issue is being taken seriously.

Immediate Actions

For Telegram Business users, there are some immediate steps to mitigate risk. Users can limit incoming messages from new contacts through the app's privacy settings. By restricting messages to saved contacts or Premium users, they can reduce the chances of being targeted by malicious actors. It's crucial for users to remain vigilant and monitor any suspicious activity on their devices until a patch is released.

In conclusion, the alleged Telegram zero-day vulnerability highlights the ongoing challenges in mobile security. Users must stay informed and take proactive measures to protect their devices while awaiting further developments from Telegram.

🔒 Pro insight: The potential for zero-click exploits in popular messaging apps like Telegram highlights the urgent need for proactive security measures and timely patch management.

Original article from

SASecurity Affairs· Pierluigi Paganini
Read Full Article

Related Pings

HIGHVulnerabilities

Optimizing Risk Discovery - Enhancing Qualys Gateway Service

The Qualys Gateway Service enhances vulnerability management by optimizing patch delivery and improving network efficiency. This is vital as unpatched vulnerabilities pose significant cyber risks. Organizations can now remediate vulnerabilities faster and more effectively.

Qualys Blog·
MEDIUMVulnerabilities

macOS Terminal Warning - Blocks ClickFix Attack Commands

Apple's new macOS update blocks risky commands in Terminal to prevent ClickFix attacks. This feature alerts users about potential dangers when pasting commands. Stay safe by understanding what you execute!

BleepingComputer·
HIGHVulnerabilities

IBM Security Advisory - Critical Vulnerabilities Addressed

IBM has issued a security advisory addressing critical vulnerabilities in multiple products. Users must update their systems to avoid risks. Stay safe by applying the necessary patches promptly.

Canadian Cyber Centre Alerts·
CRITICALVulnerabilities

Fortinet Security Advisory - Critical Vulnerability Update

Fortinet has issued a security advisory for a critical vulnerability in FortiClientEMS 7.4.4. This flaw is actively exploited, putting users at risk. Immediate updates are essential to safeguard sensitive data.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Citrix NetScaler Vulnerability - Exploited Within Days

A serious vulnerability in Citrix NetScaler has been exploited by attackers within days of its discovery. Organizations using this software are at risk of data breaches. Timely patching is crucial to safeguard sensitive information.

The Register Security·
CRITICALVulnerabilities

Stored XSS Vulnerability - Critical Risk in Jira Work Management

A critical vulnerability in Jira Work Management allows low-privileged users to take over organizations. This flaw could expose sensitive data and disrupt operations. Organizations must act quickly to secure their systems.

Cyber Security News·