{"id":20597,"date":"2023-01-25T06:17:38","date_gmt":"2023-01-25T11:17:38","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/signal-desktop-file-vulnerabilities\/20597\/"},"modified":"2023-01-25T19:43:07","modified_gmt":"2023-01-25T15:43:07","slug":"signal-desktop-file-vulnerabilities","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/signal-desktop-file-vulnerabilities\/20597\/","title":{"rendered":"Newly-discovered Signal vulnerabilities \u2014 how dangerous are they?"},"content":{"rendered":"<p>Cybersecurity researcher John Jackson has <a href=\"https:\/\/johnjhacking.com\/blog\/cve-2023-24068-cve-2023-24069\/\" target=\"_blank\" rel=\"nofollow noopener\">published a study<\/a> on two vulnerabilities he\u2019s found in the Signal messenger desktop client \u2014 <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-24069\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2023-24069<\/a> and <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-24068\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2023-24068<\/a>. The expert is sure that malefactors can exploit these vulnerabilities for espionage. Since Signal desktop applications for all operating systems have a common code base, both vulnerabilities are present not only in the Windows client, but in the MacOS and Linux clients as well. All versions up to the latest (6.2.0) are vulnerable. Let\u2019s look at how real the threat is.<\/p>\n<h2>The CVE-2023-24069 and CVE-2023-24068 vulnerabilities: what gives?<\/h2>\n<p>The first vulnerability, CVE-2023-24069, lies in an ill-conceived mechanism that handles files sent via Signal. When you send a file to a Signal chat, the desktop client saves it in a local directory. When a file is deleted, it disappears from the directory\u2026 unless someone answers it or forwards it to another chat. Moreover, despite the fact that Signal is positioned as a secure messenger and all communications via it are encrypted, the files are stored in unprotected form.<\/p>\n<p>The second vulnerability, CVE-2023-24068, was found upon closer study of the client. It turns out that the client lacks a file validation mechanism. Theoretically, this allows an attacker to replace them. That is, if the forwarded file is opened on the desktop client, someone could replace it in the local folder with a forged one. Therefore, with further transfers, a user will distribute the switched file instead of the one they were intended to forward.<\/p>\n<h2>How might these vulnerabilities be dangerous?<\/h2>\n<p>The potential risks posed by CVE-2023-24069 are more or less understandable. If a user of Signal\u2019s desktop version leaves their computer unlocked and unattended, someone could gain access to files sent through Signal. The same thing may happen if full disk encryption is enabled on the computer and the owner tends to leave it somewhere unattended (in hotel rooms, for example).<\/p>\n<p>The exploitation of the second vulnerability requires a more comprehensive approach. Let\u2019s say a person frequently receives and sends files through the Signal desktop app (for example, a manager sending tasks to subordinates). Here, an attacker with access to this computer can replace one of the files, or, for the sake of stealth, modify an existing document, for example by inserting a malicious script into it. Thus, with further transfers of the same file, its owner will spread the malware to their contacts.<\/p>\n<p>It\u2019s important to emphasize that exploitation of both vulnerabilities is possible only if the attacker already has access to the victim\u2019s computer. But this isn\u2019t an unreal scenario \u2014 we\u2019re not necessarily talking about physical access. It would be enough to infect the computer with malware that allows outsiders to manipulate files.<\/p>\n<h2>How to stay safe?<\/h2>\n<p>According to the CVE Program, Signal developers <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-24069\" target=\"_blank\" rel=\"nofollow noopener\">disagree<\/a> with the importance of these vulnerabilities, stating that their product should not and cannot protect from attackers with this level of access to the victim\u2019s system. Therefore, the best advice would be not to use the desktop version of Signal (and desktop versions of messengers in general). But if your working process requires it for some tasks, then we recommend the following:<\/p>\n<ul>\n<li>teaching your employees not to leave an unlocked computer unattended;<\/li>\n<li>always using full disk encryption on working devices;<\/li>\n<li>employing <a href=\"https:\/\/me-en.kaspersky.com\/small-business-security\/small-office-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksos___\" target=\"_blank\" rel=\"noopener\">security solutions<\/a> that can detect and stop malware and attempts at unauthorized accessing of your data.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksos-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Researchers have found vulnerabilities in the desktop client of the Signal messenger. Let&#8217;s see how dangerous they really are.<\/p>\n","protected":false},"author":2698,"featured_media":20598,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1917],"tags":[261,577,2107,268],"class_list":{"0":"post-20597","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-encryption","10":"tag-messengers","11":"tag-signal","12":"tag-vulnerabilities"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/signal-desktop-file-vulnerabilities\/20597\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/signal-desktop-file-vulnerabilities\/25103\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/signal-desktop-file-vulnerabilities\/27728\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/signal-desktop-file-vulnerabilities\/25426\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/signal-desktop-file-vulnerabilities\/25784\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/signal-desktop-file-vulnerabilities\/28329\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/signal-desktop-file-vulnerabilities\/27538\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/signal-desktop-file-vulnerabilities\/34587\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/signal-desktop-file-vulnerabilities\/46978\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/signal-desktop-file-vulnerabilities\/20047\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/signal-desktop-file-vulnerabilities\/20665\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/signal-desktop-file-vulnerabilities\/29688\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/signal-desktop-file-vulnerabilities\/25808\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/signal-desktop-file-vulnerabilities\/31466\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/signal-desktop-file-vulnerabilities\/31179\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/vulnerabilities\/","name":"vulnerabilities"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2698"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=20597"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20597\/revisions"}],"predecessor-version":[{"id":20599,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20597\/revisions\/20599"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/20598"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=20597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=20597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=20597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}