Signal Desktop before 6.2.0 on Windows, Linux, and macOS allows an attacker to obtain potentially sensitive attachments sent in messages from the attachments.noindex directory. Cached attachments are not effectively cleared. In some cases, even after a self-initiated file deletion, an attacker can still recover the file if it was previously replied to in a conversation. (Local filesystem access is needed by the attacker.) NOTE: the vendor disputes the relevance of this finding because the product is not intended to protect against adversaries with this degree of local access.
References
Link Resource
https://johnjhacking.com/blog/cve-2023-24068-cve-2023-24069/ Exploit Third Party Advisory
https://signal.org/download/linux Product Vendor Advisory
https://signal.org/download/macos Product Vendor Advisory
https://signal.org/en/download/windows Product Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2023-01-23T00:00:00

Updated: 2024-06-04T17:21:25.149Z

Reserved: 2023-01-23T00:00:00


Link: CVE-2023-24069

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2023-01-23T07:15:11.137

Modified: 2024-06-04T19:17:23.460


Link: CVE-2023-24069

JSON object: View

cve-icon Redhat Information

No data.