Vulnerability Details : CVE-2018-15543
** DISPUTED ** An issue was discovered in the org.telegram.messenger application 4.8.11 for Android. The FingerprintManager class for Biometric validation allows authentication bypass through the callback method from onAuthenticationFailed to onAuthenticationSucceeded with null, because the fingerprint API in conjunction with the Android keyGenerator class is not implemented. In other words, an attacker could authenticate with an arbitrary fingerprint. NOTE: the vendor indicates that this is not an attack of interest within the context of their threat model, which excludes Android devices on which rooting has occurred.
Vulnerability category: BypassGain privilege
Exploit prediction scoring system (EPSS) score for CVE-2018-15543
Probability of exploitation activity in the next 30 days: 0.07%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 28 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2018-15543
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
[email protected] |
6.8
|
MEDIUM | CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
0.9
|
5.9
|
[email protected] |
CWE ids for CVE-2018-15543
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: [email protected] (Primary)
References for CVE-2018-15543
-
https://gist.github.com/tanprathan/d286c0d5b02e344606287774304a1ccd
Third Party Advisory
Products affected by CVE-2018-15543
- cpe:2.3:a:telegram:telegram:4.8.11:*:*:*:*:android:*:*