Last Modified: Feb. 2, 2023
** DISPUTED ** Signal Desktop before 6.2.0 on Windows, Linux, and macOS allows an attacker to modify conversation attachments within the attachments.noindex directory. Client mechanisms fail to validate modifications of existing cached files, resulting in an attacker's ability to insert malicious code into pre-existing attachments or replace them completely. A threat actor can forward the existing attachment in the corresponding conversation to external groups, and the name and size of the file will not change, allowing the malware to masquerade as another file. NOTE: the vendor disputes the relevance of this finding because the product is not intended to protect against adversaries with this degree of local access.
Tweets last week: 26
Remaining steady
Yahoo results: 322000000
Remaining steady
Current EPSS Score: 0.01669
Remaining steady
Reddit Posts: 6
Remaining steady
Github Repos: 1
Remaining steady
Found exploits:
Attack Vector: Local
Attack Complexity: Low
Privileges Required: Low
User Interaction: None
Scope: Unchanged
Confidentiality: High
Integrity: High
Availability: High
Base Score: 7.8
Exploitability Score:
1.8
Impact Score: 5.9
CVSS V3: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
NVD-CWE-noinfo
Condition | Configuration | |
---|---|---|
AND | ||
OR | ||
OR | ||
cpe:2.3:a:signal:signal-desktop:*:*:*:*:*:*:*:* Part: a Vendor: signal | Alle Schwachstellen für signal | |
OR | ||
OR | ||
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* Part: o Vendor: apple | Alle Schwachstellen für apple | |
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* Part: o Vendor: linux | Alle Schwachstellen für linux | |
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* Part: o Vendor: microsoft | Alle Schwachstellen für microsoft |
Description:
Signal Desktop before 6.2.0 on Windows, Linux, and macOS allows an attacker to modify conversation attachments within the attachments.noindex directory. Client mechanisms fail to validate modifications of existing cached files, resulting in an attacker's ability to insert malicious code into pre-existing attachments or replace them completely. A threat actor can forward the existing attachment in the corresponding conversation to external groups, and the name and size of the file will not change, allowing the malware to masquerade as another file.
CWE-ID:
Not defined
Base Score V3:
Not defined
Exploitability Score V3:
Not defined
Impact Score V3:
Not defined
Cvss Vector V3:
Not defined
<?xml version="1.0" ?> <set operator="and"> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:signal:signal-desktop:*:*:*:*:*:*:*:*"/> </set> <set operator="or"> <prop key="operating_system" value="cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"/> <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"/> <prop key="operating_system" value="cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"/> </set> </set> </set>
<?xml version="1.0" ?> <set operator="and"> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:signal:signal-desktop:*:*:*:*:*:*:*:*"/> </set> <set operator="or"> <prop key="operating_system" value="cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"/> <prop key="operating_system" value="cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"/> <prop key="operating_system" value="cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"/> </set> </set> <prop key="program_influence" value="input"/> </set>