3.3
CVSSv3

CVE-2023-24069

Published: 23/01/2023 Updated: 02/02/2023
CVSS v3 Base Score: 3.3 | Impact Score: 1.4 | Exploitability Score: 1.8

Vulnerability Summary

** DISPUTED ** Signal Desktop prior to 6.2.0 on Windows, Linux, and macOS allows an malicious user to obtain potentially sensitive attachments sent in messages from the attachments.noindex directory. Cached attachments are not effectively cleared. In some cases, even after a self-initiated file deletion, an attacker can still recover the file if it was previously replied to in a conversation. (Local filesystem access is needed by the attacker.) NOTE: the vendor disputes the relevance of this finding because the product is not intended to protect against adversaries with this degree of local access.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

signal signal-desktop

Github Repositories

CVE-2023-24069 Signal Desktop before 620 on Windows, Linux, and macOS allows an attacker to obtain potentially sensitive attachments sent in messages from the attachmentsnoindex directory Cached attachments are not effectively cleared In some cases, even after a self-initiated file deletion, an attacker can still recover the file if it was previously replied to in a conver

CVE-2023-24068 Signal Desktop before 620 on Windows, Linux, and macOS allows an attacker to modify conversation attachments within the attachmentsnoindex directory Client mechanisms fail to validate modifications of existing cached files, resulting in an attacker's ability to insert malicious code into pre-existing attachments or replace them completely A threat actor