CVE-2025-48931

The TeleMessage service through 2025-05-05 relies on MD5 for password hashing, which opens up various attack possibilities (including rainbow tables) with low computational effort.
Configurations

Configuration 1 (hide)

cpe:2.3:a:smarsh:telemessage:*:*:*:*:*:*:*:*

History

03 Oct 2025, 14:32

Type Values Removed Values Added
Summary
  • (es) El servicio TeleMessage hasta el 5 de mayo de 2025 se basa en MD5 para el hash de contraseñas, lo que abre varias posibilidades de ataque (incluidas tablas arcoíris) con un bajo esfuerzo computacional.
First Time Smarsh
Smarsh telemessage
References () https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/ - () https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/ - Press/Media Coverage
CPE cpe:2.3:a:smarsh:telemessage:*:*:*:*:*:*:*:*

28 May 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-28 17:15

Updated : 2025-10-03 14:32


NVD link : CVE-2025-48931

Mitre link : CVE-2025-48931

CVE.ORG link : CVE-2025-48931


JSON object : View

Products Affected

smarsh

  • telemessage
CWE
CWE-328

Use of Weak Hash