Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns of TeleMessage TM SGNL Vulnerabilities Exploited in Attacks

Posted on July 2, 2025July 2, 2025 By CWS

CISA has issued an pressing warning relating to two vital vulnerabilities in TeleMessage TM SGNL that risk actors are at present exploiting in energetic assault campaigns.

The vulnerabilities, tracked as CVE-2025-48927 and CVE-2025-48928, pose important safety dangers to organizations using this communication platform, with CISA including each flaws to its Recognized Exploited Vulnerabilities (KEV) catalog on July 1, 2025. 

Key Takeaways1. CVE-2025-48927 and CVE-2025-48928 expose delicate information by means of insecure Spring Boot Actuator and JSP configurations in TeleMessage TM SGNL.2. CISA confirmed energetic exploitation and set a remediation deadline of July 22, 2025, for federal businesses.3. Apply vendor patches instantly or discontinue product use in accordance with BOD 22-01 steering.4. Unpatched techniques danger information theft, privilege escalation, and potential ransomware assaults.

Organizations have till July 22, 2025, to implement obligatory mitigations or discontinue use of the affected product to guard their infrastructure from potential compromises.

Spring Boot Actuator Flaw (CVE-2025-48927)

The primary vulnerability, CVE-2025-48927, represents an initialization of a useful resource with an insecure default configuration flaw, labeled below CWE-1188. 

This vital safety weak point stems from improper configuration of the Spring Boot Actuator part, which inadvertently exposes a delicate heap dump endpoint accessible by way of the /heapdump URI path. 

This misconfiguration permits unauthorized attackers to entry reminiscence dumps containing doubtlessly delicate info, together with authentication credentials, session tokens, and different confidential information saved within the software’s reminiscence area.

Core Dump Publicity Flaw (CVE-2025-48928)

The second vulnerability, CVE-2025-48928, entails the publicity of core dump information to unauthorized management spheres, categorized below CWE-528. 

This flaw impacts the platform’s JSP (JavaServer Pages) software structure, the place heap content material turns into accessible in a way equal to conventional core dumps. 

The vulnerability is especially regarding as a result of it could possibly expose passwords and different delicate authentication information that had been beforehand transmitted over HTTP connections, creating a major information publicity danger for organizations counting on TeleMessage TM SGNL for safe communications.

CVEsDescriptionAffected ProductsCVSS 3.1 ScoreCVE-2025-48927An initialization of a useful resource with an insecure default vulnerability. TeleMessage TM SGNL5.3 (Medium)CVE-2025-48928An publicity of core dump file to an unauthorized management sphere vulnerabilityTeleMessage TM SGNL4.0 (Medium)

Mitigations

CISA has labeled each vulnerabilities as actively exploited threats, although the company notes that their potential use in ransomware campaigns stays unknown right now. 

The federal cybersecurity company strongly recommends that organizations instantly apply vendor-provided mitigations if obtainable, emphasizing the vital nature of those safety flaws. 

Moreover, CISA advises organizations to observe relevant Binding Operational Directive (BOD) 22-01 steering particularly associated to cloud providers safety necessities.

For organizations unable to find vendor mitigation directions or these discovering that sufficient mitigations are unavailable, CISA recommends the extra drastic step of discontinuing use of the TeleMessage TM SGNL product totally. 

This suggestion underscores the severity of the vulnerabilities and the potential influence on organizational safety posture.

The July 22, 2025, deadline offers a slender window for organizations to evaluate their publicity, implement acceptable safety measures, and guarantee compliance with federal cybersecurity directives whereas sustaining operational continuity throughout this vital remediation interval.

Cyber Security News Tags:Attacks, CISA, Exploited, SGNL, TeleMessage, Vulnerabilities, Warns

Post navigation

Previous Post: Microsoft Authenticator to Discontinue Password Support and Cease Operations by August 2025
Next Post: Like Ransoming a Bike: Organizational Muscle Memory Drives the Most Effective Response

Related Posts

Shai-Hulud 2.0 Malware Attack Compromised 30,000 Repositories and Stolen 500 GitHub Usernames and Tokens Cyber Security News
Threat Actors Leverage Oracle Database Scheduler to Gain Access to Corporate Environments Cyber Security News
Malicious PyPI Package Mimics as SOCKS5 Proxy Tool Attacking Windows Platforms Cyber Security News
Hackers Mimic IT Teams to Exploit Microsoft Teams Request to Gain System Remote Access Cyber Security News
CISA Warns of WhatsApp 0-Day Vulnerability Exploited in Attacks Cyber Security News
Threat Actors Compromise Xubuntu Website To Deliver Malicious Windows Executable Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Expose All User Records from Popular Dark Web Forum
  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Expose All User Records from Popular Dark Web Forum
  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark