Storm Brews Over Critical, No-Click Telegram Flaw

This title could be clearer and more informative.Try out Clickbait Shieldfor free (5 uses left this month).

A critical zero-click vulnerability (ZDI-CAN-30207) in Telegram Messenger has been disclosed by Trend Micro's Zero Day Initiative with a 9.8 CVSS score, but full details are withheld until July 26. The flaw allegedly uses corrupted animated stickers as an attack vector on Android and Linux versions, enabling remote code execution, data theft, and surveillance without any user interaction. Telegram denies the vulnerability exists, claiming its servers validate all stickers before delivery. Italy's National Cybersecurity Agency issued an alert, and security researchers recommend users apply updates promptly, restrict message reception to trusted contacts, or temporarily switch to the browser-based Telegram client for better sandboxing.

5m read timeFrom darkreading.com
Post cover image
Table of contents
When Good Stickers Go BadMore Trouble for Telegram?Defensive Measures

Sort: