APromptRiskDBThreat intelligence atlas
AI Vulnerability Context

CVE-2025-48928 - TeleMessage TM SGNL

TeleMessage TM SGNL contains an exposure of core dump file to an unauthorized control sphere Vulnerability. This vulnerability is based on a JSP application in which the heap content is roughly equivalent to a "core dump" in which a password previously sent over HTTP would be included in this dump.

AI Vulnerability ContextCISA KEVTeleMessage

Record summary

A quick snapshot of what this page covers.

CISA KEVyesWhether CISA lists this as exploited.
Techniques0AI attack methods connected to this vulnerability.
Case studies0Examples where this vulnerability is mentioned.

Vulnerability status

How serious this vulnerability is and whether it is known to be exploited.

CISA KEV
CVE ID
CVE-2025-48928
Vendor/project
TeleMessage
Product
TM SGNL
Vulnerability name
TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability
Date added
2025-07-01
Due date
2025-07-22
Known ransomware campaign use
Unknown
CWE-528

Exploit context

What the vulnerability is about.

No description available. The source record only contains identifiers and metadata.

Source

Where this page information comes from.