Cisa Adds Telemessage Vulnerability To Kev List Following Breach

Trending 12 hours ago
ARTICLE AD BOX

CISA adds TeleMessage flaw to KEV list, urges agencies to enactment wrong 3 weeks aft a breach exposed unencrypted chats. The Israeli App was utilized by Trump officials!

A superior flaw successful TM SGNL, a messaging app by US-Israeli patient TeleMessage utilized by erstwhile Trump management officials, has now landed connected CISA’s Known Exploited Vulnerabilities (KEV) list. The move follows reports of a breach that exposed delicate communications and backend data.

The Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-47729 to its KEV catalogue this week. The listing confirms that nan vulnerability has been exploited successful nan chaotic and sets a three-week deadline for national agencies to reside nan issue.

Breach and Research Findings

On May 5, Hackread.com reported that TeleMessage had halted operations of TM SGNL aft attackers gained entree to backend systems and personification connection data. The breach formed uncertainty connected nan platform’s halfway information claims.

Security interrogator Micah Lee analyzed nan app’s root codification and recovered a superior spread successful its encryption model. While TeleMessage stated that TM SGNL utilized end-to-end encryption, Lee’s findings propose otherwise. Communication betwixt nan app and its last retention constituent lacked afloat encryption, which opened nan doorway for attackers to intercept plaintext chat logs.

This uncovering raised immoderate superior information and privateness concerns fixed nan app’s past usage by high-level figures, including erstwhile nationalist information advisor Mike Waltz.

Follow america connected TikTok

Why CISA Acted

CISA’s determination to adhd nan flaw to its KEV database sends a clear connection to authorities agencies: nan package isn’t safe. It puts unit connected them to spot aliases driblet it quickly.

Thomas Richards, Infrastructure Security Practice Director astatine Black Duck, said nan determination apt stemmed from nan software’s usage successful government:

“This vulnerability was astir apt added to nan KEV database because of who was utilizing it. With delicate authorities conversations involved, nan breach takes connected different level of risk. CISA’s move is astir making judge agencies cognize this package shouldn’t beryllium trusted.”

Casey Ellis, laminitis of Bugcrowd, added that nan inclusion confirms nan severity:

“CISA is making judge national agencies sewage nan message. The truth that nan logs weren’t decently encrypted changes nan consequence equation. And while nan CVSS 1.9 people whitethorn look low, it still reflects nan threat of compromising nan instrumentality storing those logs.”

What’s Next

Federal agencies are now required to enactment wrong 3 weeks. Organizations extracurricular nan authorities are besides advised to reappraisal nan KEV catalogue and see prioritizing patches aliases replacement solutions.

The breach and pursuing KEV listing person pushed TeleMessage into a larger chat astir transparency, encryption standards, and nan information infrastructure of platforms utilized successful governmental and governmental communication.

For much information, nan CVE introduction is disposable via NVD, and nan KEV catalogue tin beryllium accessed connected nan CISA website.

More