The TeleMessage archiving backend through 2025-05-05 accepts API calls (to request an authentication token) from the TM SGNL (aka Archive Signal) app with the credentials of logfile for the user and enRR8UVVywXYbFkqU#QDPRkO for the password.
References
Configurations
History
22 Oct 2025, 14:53
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Smarsh telemessage
Smarsh |
|
| CPE | cpe:2.3:a:smarsh:telemessage:*:*:*:*:*:*:*:* | |
| References | () https://arstechnica.com/security/2025/05/signal-clone-used-by-trump-official-stops-operations-after-report-it-was-hacked/ - Press/Media Coverage | |
| References | () https://github.com/micahflee/TM-SGNL-Android/blob/bd7ccbb8bc79193fc4c57cae7cc1051e6250fa89/app/src/tm/java/org/archiver/ArchiveConstants.kt#L45-L46 - Product | |
| References | () https://news.ycombinator.com/item?id=43909220 - Issue Tracking | |
| References | () https://www.theregister.com/2025/05/05/telemessage_investigating/ - Press/Media Coverage |
08 May 2025, 14:39
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-08 14:15
Updated : 2025-10-22 14:53
NVD link : CVE-2025-47730
Mitre link : CVE-2025-47730
CVE.ORG link : CVE-2025-47730
JSON object : View
Products Affected
smarsh
- telemessage
CWE
CWE-798
Use of Hard-coded Credentials
