Vulnerability Description
The Signal Private Messenger application before 4.47.7 for Android allows a caller to force a call to be answered, without callee user interaction, via a connect message. The existence of the call is noticeable to the callee; however, the audio channel may be open before the callee can block eavesdropping.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Signal | Private Messenger | < 4.47.7 |
Related Weaknesses (CWE)
References
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1943ExploitThird Party Advisory
- https://news.ycombinator.com/item?id=21161432ExploitIssue TrackingThird Party Advisory
- https://twitter.com/moxie/status/1180261210341511168Third Party Advisory
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1943ExploitThird Party Advisory
- https://news.ycombinator.com/item?id=21161432ExploitIssue TrackingThird Party Advisory
- https://twitter.com/moxie/status/1180261210341511168Third Party Advisory
FAQ
What is CVE-2019-17191?
CVE-2019-17191 is a vulnerability with a CVSS score of 7.5 (HIGH). The Signal Private Messenger application before 4.47.7 for Android allows a caller to force a call to be answered, without callee user interaction, via a connect message. The existence of the call is ...
How severe is CVE-2019-17191?
CVE-2019-17191 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-17191?
Check the references section above for vendor advisories and patch information. Affected products include: Signal Private Messenger.