The TeleMessage archiving backend through 2025-05-05 holds cleartext copies of messages from TM SGNL (aka Archive Signal) app users, which is different functionality than described in the TeleMessage "End-to-End encryption from the mobile phone through to the corporate archive" documentation, as exploited in the wild in May 2025.
References
| Link | Resource |
|---|---|
| https://arstechnica.com/security/2025/05/signal-clone-used-by-trump-official-stops-operations-after-report-it-was-hacked/ | Press/Media Coverage |
| https://news.ycombinator.com/item?id=43909220 | Press/Media Coverage |
| https://www.theregister.com/2025/05/05/telemessage_investigating/ | Press/Media Coverage |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-47729 |
Configurations
History
21 Oct 2025, 23:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:20
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:21
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
14 May 2025, 13:12
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-08 14:15
Updated : 2025-10-21 23:17
NVD link : CVE-2025-47729
Mitre link : CVE-2025-47729
CVE.ORG link : CVE-2025-47729
JSON object : View
Products Affected
telemessage
- text_message_archiver
CWE
