CVE-2025-48931

The TeleMessage service through 2025-05-05 relies on MD5 for password hashing, which opens up various attack possibilities (including rainbow tables) with low computational effort.
Configurations

Configuration 1 (hide)

cpe:2.3:a:smarsh:telemessage:*:*:*:*:*:*:*:*

History

03 Oct 2025, 14:32

Type Values Removed Values Added
CPE cpe:2.3:a:smarsh:telemessage:*:*:*:*:*:*:*:*
References () https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/ - () https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/ - Press/Media Coverage
First Time Smarsh telemessage
Smarsh

29 May 2025, 14:29

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-28 17:15

Updated : 2025-10-03 14:32


NVD link : CVE-2025-48931

Mitre link : CVE-2025-48931

CVE.ORG link : CVE-2025-48931


JSON object : View

Products Affected

smarsh

  • telemessage
CWE
CWE-328

Use of Weak Hash