
A high-risk vulnerability has been identified in Telegram's desktop application, specifically in its media processing capabilities, exposing users to potential remote code execution (RCE) attacks. Security firm CertiK discovered the vulnerability, advising users to disable the automatic download feature for photos, videos, and other files to mitigate the risk. The exploit involves a 1-click attack that could potentially deliver Windows-specific malware, targeting both mobile and PC users. Users are strongly advised to adjust their Telegram settings to prevent the auto-downloading of media files and disable both wi-fi and...
JUST IN: @CERTIK WARNS @TELEGRAM USERS LEAVING “AUTO-DOWNLOAD MEDIA” SETTING ENABLED COULD EXPOSE THEM TO MALICIOUS ATTACKS
Do you use Telegram?
🚨IF YOU USE TELEGRAM, READ THIS🚨🤯 CertiK just spotted a serious security issue with Telegram. It seems there's a loophole that could let hackers run harmful code through media files. To stay safe, it's best to turn off the auto-download feature for photos, videos, and… https://t.co/jdCV3Tqp0u
