ID: CVE-2023-24068

Last Modified: Feb. 2, 2023

** DISPUTED ** Signal Desktop before 6.2.0 on Windows, Linux, and macOS allows an attacker to modify conversation attachments within the attachments.noindex directory. Client mechanisms fail to validate modifications of existing cached files, resulting in an attacker's ability to insert malicious code into pre-existing attachments or replace them completely. A threat actor can forward the existing attachment in the corresponding conversation to external groups, and the name and size of the file will not change, allowing the malware to masquerade as another file. NOTE: the vendor disputes the relevance of this finding because the product is not intended to protect against adversaries with this degree of local access.

Twitter Activity

Tweets last week: 26

Remaining steady

Yahoo Activity

Yahoo results: 322000000

Remaining steady

EPSS History

Current EPSS Score: 0.01669

Remaining steady


Reddit Activity

Reddit Posts: 6

Remaining steady

Github Repos

Github Repos: 1

Remaining steady

Exploits

Found exploits:

Attack Vector: Local

Attack Complexity: Low

Privileges Required: Low

User Interaction: None

Scope: Unchanged

Confidentiality: High

Integrity: High

Availability: High

Base Score: 7.8

Exploitability Score: 1.8

Impact Score: 5.9

CVSS V3: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Specialize CVSS-Score

NVD-CWE-noinfo

Condition Configuration
AND
OR
OR
Alle Schwachstellen für signal
OR
OR
Alle Schwachstellen für apple
Alle Schwachstellen für linux
Alle Schwachstellen für microsoft
Date: Jan. 26, 2023

Description: Signal Desktop before 6.2.0 on Windows, Linux, and macOS allows an attacker to modify conversation attachments within the attachments.noindex directory. Client mechanisms fail to validate modifications of existing cached files, resulting in an attacker's ability to insert malicious code into pre-existing attachments or replace them completely. A threat actor can forward the existing attachment in the corresponding conversation to external groups, and the name and size of the file will not change, allowing the malware to masquerade as another file.



Date: Feb. 2, 2023

CWE-ID: Not defined
Base Score V3: Not defined
Exploitability Score V3: Not defined
Impact Score V3: Not defined
Cvss Vector V3: Not defined



                    <?xml version="1.0" ?>
<set operator="and">
    <set operator="and">
        <set operator="or">
            <prop key="application" value="cpe:2.3:a:signal:signal-desktop:*:*:*:*:*:*:*:*"/>
        </set>
        <set operator="or">
            <prop key="operating_system" value="cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"/>
            <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"/>
            <prop key="operating_system" value="cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"/>
        </set>
    </set>
</set>

                  
                      <?xml version="1.0" ?>
<set operator="and">
    <set operator="and">
        <set operator="or">
            <prop key="application" value="cpe:2.3:a:signal:signal-desktop:*:*:*:*:*:*:*:*"/>
        </set>
        <set operator="or">
            <prop key="operating_system" value="cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"/>
            <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"/>
            <prop key="operating_system" value="cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"/>
        </set>
    </set>
    <prop key="program_influence" value="input"/>
</set>