U.S. CISA adds TeleMessage TM SGNL flaws to its Known Exploited Vulnerabilities catalog
美国网络安全和基础设施安全局(CISA)将TeleMessage TM SGNL的两个漏洞加入已知被利用的漏洞目录。这两个漏洞分别为CVE-2025-48927(CVSS 5.3)和CVE-2025-48928(CVSS 4.0),涉及资源初始化不安全默认配置和核心转储文件未经授权暴露问题。这些漏洞已在2025年5月被实际利用,CISA要求联邦机构于7月22日前修复。 2025-7-2 07:37:49 Author: securityaffairs.com(查看原文) 阅读量:30 收藏

U.S. CISA adds TeleMessage TM SGNL flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds TeleMessage TM SGNL flaws to its Known Exploited Vulnerabilities catalog.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added TeleMessage TM SGNL flaws to its Known Exploited Vulnerabilities (KEV) catalog.

Below are the descriptions for these flaws:

  • CVE-2025-48927 (CVSS score of 5.3) TeleMessage TM SGNL Initialization of a Resource with an Insecure Default Vulnerability
  • CVE-2025-48928 (CVSS score of 4.0) TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability

CVE-2025-48927 is an Initialization of a Resource with an Insecure Default Vulnerability that affects TeleMessage TM SGNL. TeleMessage, up to May 5, 2025, had a misconfigured Spring Boot Actuator exposing a /heapdump endpoint, which was exploited in real-world attacks that same month.

CVE-2025-48928 is a Core Dump File to an Unauthorized Control Sphere Vulnerability affecting TeleMessage TM SGNL. The TeleMessage service through 2025-05-05 is based on a JSP application in which the heap content is roughly equivalent to a “core dump” in which a password previously sent over HTTP would be included in this dump, as exploited in the wild in May 2025.

According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities, FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks exploiting the flaws in the catalog.

Experts also recommend that private organizations review the Catalog and address the vulnerabilities in their infrastructure.

CISA orders federal agencies to fix the vulnerabilities by July 22, 2025.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, CISA)




文章来源: https://securityaffairs.com/179542/hacking/u-s-cisa-adds-telemessage-tm-sgnl-flaws-to-its-known-exploited-vulnerabilities-catalog.html
如有侵权请联系:admin#unsafe.sh