Description
Telegram Desktop before 1.5.12 on Windows, and the Telegram applications for Android, iOS, and Linux, is vulnerable to an IDN homograph attack when displaying messages containing URLs. This occurs because the application produces a clickable link even if (for example) Latin and Cyrillic characters exist in the same domain name, and the available font has an identical representation of characters from different alphabets.
References (2)
Core 2
Core References
Exploit, Third Party Advisory x_refsource_misc
https://github.com/blazeinfosec/advisories/blob/master/telegram-advisory.txt
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/107610
Scores
CVSS v3
8.8
EPSS
0.0076
EPSS Percentile
73.5%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Details
Status
published
Products (2)
telegram/telegram
telegram/telegram_desktop
< 1.5.12
Published
Mar 25, 2019
Tracked Since
Feb 18, 2026