Vulnerability Details : CVE-2018-17613
Telegram Desktop (aka tdesktop) 1.3.16 alpha, when "Use proxy" is enabled, sends credentials and application data in cleartext over the SOCKS5 protocol.
Exploit prediction scoring system (EPSS) score for CVE-2018-17613
Probability of exploitation activity in the next 30 days: 0.21%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 58 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2018-17613
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
[email protected] |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
[email protected] |
CWE ids for CVE-2018-17613
-
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.Assigned by: [email protected] (Primary)
References for CVE-2018-17613
-
https://seclists.org/oss-sec/2018/q3/280
Mailing List;Third Party Advisory
-
https://www.inputzero.io/2018/09/telegram-share-password-in-cleartext.html
Third Party Advisory
Products affected by CVE-2018-17613
- cpe:2.3:a:telegram:telegram_desktop:1.3.16:alpha:*:*:*:*:*:*