Telegram = Pandora box ๐Ÿ˜ˆ
9.8 on the CVSS scale, Critical

This CVE is with a very high score and itโ€™s recent. Propagates via Telegram because of the specific improper file parsing. This leads to RCE exploit. No patch available! Anyone can be hacked.

Simply restrict your asset and use different communicators.

#no_patch
#critical_CVE
#compromised
#connected=hacked!

https://www.linkedin.com/posts/dmitriy-galasli_cybersecurity-infosec-rce-activity-7443411822818381824-FgfP?utm_source=share&utm_medium=member_ios&rcm=ACoAAA1EWg0Bu_zkYkbF2V7AK2EjSYvsnm4OSJU

#cybersecurity #infosec #rce #zeroclick #vulnerability #telegram | Dmitriy Galasli | 10 comments

๐—ง๐—ต๐—ถ๐˜€ ๐—ฐ๐—ผ๐˜‚๐—น๐—ฑ ๐—ฏ๐—ฒ ๐˜‚๐˜€๐—ฒ๐—ฑ ๐˜๐—ผ ๐—ต๐—ฎ๐—ฐ๐—ธ ๐—ฎ๐—ป๐˜†๐—ผ๐—ป๐—ฒ A critical vulnerability has been discovered in Telegram, rated 9.8 on the CVSS scale. Details are not yet disclosed, but given the near-maximum score, it could potentially be a 0-click RCE โ€” meaning an attacker might gain access to a target device simply by sending a crafted payload through the client. The issue was discovered by Michael DePlante , a researcher known for hunting bugs in major companies such as Apple, Adobe, and Avast. In 2024 alone, he identified 37 vulnerabilities, bringing his total to over 150. Many of his findings involve improper file parsing, which increases the likelihood of RCE in platforms like Telegram. There is currently no patch available, and full disclosure is expected no later than 24 July 2026, once responsible disclosure timelines are met. ๐—™๐—ผ๐—ฟ ๐—ป๐—ผ๐˜„ โ€” ๐—ฒ๐˜ƒ๐—ฒ๐—ฟ๐˜†๐—ผ๐—ป๐—ฒ ๐—บ๐—ฎ๐˜† ๐—ฏ๐—ฒ ๐—ฎ๐—ณ๐—ณ๐—ฒ๐—ฐ๐˜๐—ฒ๐—ฑ Research: https://lnkd.in/e8zrCNZ5 #CyberSecurity #InfoSec #RCE #ZeroClick #Vulnerability #Telegram | 10 comments on LinkedIn

LinkedIn