VulnerabilitiesCRITICAL

Telegram Zero-Day - Alleged Flaw Allows Device Takeover

Featured image for Telegram Zero-Day - Alleged Flaw Allows Device Takeover
SASecurity Affairs·Reporting by Pierluigi Paganini
📰 2 sources·Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Updated:
🎯

Basically, there's a flaw in Telegram that could let hackers take over your device without you doing anything.

Quick Summary

A critical vulnerability in Telegram could allow hackers to take over devices without user interaction. Telegram denies the existence of this flaw, raising concerns for millions of users. With no patch available, the risk remains high. Stay alert and protect your device until a solution is found.

The Flaw

A newly disclosed Telegram vulnerability, tracked as ZDI-CAN-30207, poses a serious threat to user security. This flaw has a CVSS score of 9.8, indicating its critical nature. It allows attackers to execute code on targeted devices without any user interaction, simply by sending a malicious animated sticker. This zero-click exploit takes advantage of how Telegram processes media to generate previews, making it particularly dangerous.

The vulnerability affects Telegram on Android and Linux platforms. If successfully exploited, it grants attackers full control over the device, leading to potential data theft or further exploitation. The security community is on high alert, especially since no patch is currently available to mitigate this risk.

What's at Risk

The implications of this vulnerability are vast. With millions of users relying on Telegram for communication, a successful attack could lead to widespread device takeovers. The potential for exploitation in the wild raises concerns, as threat actors could quickly weaponize this flaw. The Zero Day Initiative has withheld technical details to give Telegram time to address the issue, but the lack of a patch leaves users vulnerable.

Telegram's denial of the vulnerability adds another layer of complexity. The company claims that all stickers are validated server-side, making it impossible for malicious files to be used as attack vectors. However, the cybersecurity community remains skeptical, given the severity of the reported flaw.

Patch Status

As of now, Telegram has not released any patches for this vulnerability. The Zero Day Initiative has set a deadline for Telegram to address the issue by July 24, 2026. Until then, users are left exposed to potential attacks. The Italian National Cybersecurity Agency (ACN) has reported Telegram's denial of the existence of this zero-click vulnerability, but the ongoing discussions suggest that the issue is being taken seriously.

Immediate Actions

For Telegram Business users, there are some immediate steps to mitigate risk. Users can limit incoming messages from new contacts through the app's privacy settings. By restricting messages to saved contacts or Premium users, they can reduce the chances of being targeted by malicious actors. It's crucial for users to remain vigilant and monitor any suspicious activity on their devices until a patch is released.

In conclusion, the alleged Telegram zero-day vulnerability highlights the ongoing challenges in mobile security. Users must stay informed and take proactive measures to protect their devices while awaiting further developments from Telegram.

🔒 Pro insight: The potential for zero-click exploits in popular messaging apps like Telegram highlights the urgent need for proactive security measures and timely patch management.

Original article from

SASecurity Affairs· Pierluigi Paganini
Read Full Article

Also covered by

SCSC Media

New critical Telegram zero-click issue threatens total device compromise

Read Article
DADark Reading

Storm Brews Over Critical, No-Click Telegram Flaw

Read Article

Related Pings

CRITICALVulnerabilities

Fortinet FortiClient EMS - Critical 0-Day Vulnerability Exploited

A critical zero-day vulnerability in FortiClient EMS is actively exploited. Fortinet has released emergency patches and urges immediate action from users.

Cyber Security News·
HIGHVulnerabilities

Video Conferencing Bug - CISA Orders Agencies to Patch

A serious vulnerability in TrueConf video conferencing software is being exploited by Chinese hackers. CISA has mandated a two-week patch deadline for federal agencies. Immediate action is essential to safeguard sensitive data and communications.

The Record·
HIGHVulnerabilities

Post-Deployment Vulnerability Detection - Rethinking Strategies

A new approach to vulnerability detection is needed post-deployment. Many organizations overlook risks from newly disclosed CVEs, leaving systems exposed. Rethinking strategies can enhance security.

OpenSSF Blog·
HIGHVulnerabilities

Mobile Vulnerabilities - Enterprises Struggle with Control

Mobile devices are increasingly vulnerable due to outdated software and hidden threats like Shadow AI. This puts sensitive enterprise data at risk. Organizations must act to secure their mobile environments.

SecurityWeek·
HIGHVulnerabilities

CVE-2026-33691 - OWASP CRS Whitespace Padding Bypass Alert

A new vulnerability in OWASP CRS allows attackers to upload dangerous files by exploiting whitespace in filenames. This affects many web applications, risking severe security breaches. Immediate updates are necessary to protect your systems.

Full Disclosure·
HIGHVulnerabilities

MetInfo CMS Vulnerability - PHP Code Injection Risk

A critical vulnerability in MetInfo CMS could let attackers execute arbitrary PHP code. Versions 7.9, 8.0, and 8.1 are at risk. Stay alert for updates and potential fixes.

Full Disclosure·