CISA Issues Alert on TeleMessage TM SGNL Flaws Actively Exploited
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert after adding two newly discovered vulnerabilities in the TeleMessage TM SGNL messaging platform to its Known Exploited Vulnerabilities (KEV) Catalog.
These flaws CVE-2025-48927 and CVE-2025-48928, are confirmed to have been actively exploited in the wild, prompting urgent calls for immediate remediation across both federal and private sector organizations.
TeleMessage TM SGNL is widely used in regulated industries and government agencies for secure archiving and communication, including message capture from platforms like WhatsApp, Telegram, and Signal.
The platform’s prominence in sensitive environments amplifies the risk posed by these vulnerabilities.
“An attack or successful exploitation here could result in wide-ranging consequences, from exposure of highly sensitive information to systemic disruption of critical workflows,” security experts warn.
Details of the Vulnerabilities
CVE ID | Attack Vector & Impact |
CVE-2025-48927 | Attackers exploit default settings to gain unauthorized access or escalate privileges, risking data leakage and loss of confidentiality. |
CVE-2025-48928 | Attackers may extract credentials or confidential messages from exposed dump files, threatening both data privacy and system integrity. |
CISA’s alert, issued under Binding Operational Directive (BOD) -, mandates all Federal Civilian Executive Branch (FCEB) agencies to address these vulnerabilities by July, .
The agency strongly recommends that private organizations also prioritize remediation, given the platform’s use in critical sectors.
Organizations are urged to:
- Audit all TeleMessage TM SGNL deployments for insecure defaults and exposed endpoints.
- Apply patches and configuration changes as instructed by the vendor.
- Monitor for suspicious access or privilege escalation.
- Review and secure core dump file handling and retention policies.
Failure to address these vulnerabilities could result in significant data breaches, regulatory penalties, and operational disruptions, especially for entities handling sensitive or regulated information.
CISA’s ongoing updates to the KEV Catalog highlight the persistent threat posed by misconfigurations and poor data hygiene in enterprise environments.
The agency emphasizes that timely remediation of known vulnerabilities is essential for maintaining operational integrity and trust in the digital age.
Exclusive Webinar Alert: Harnessing Intel® Processor Innovations for Advanced API Security – Register for Free
Source link