CVE-2025-48928
CISA KEVPublished July 1, 2025 · Updated April 3, 2026
high
Official Description+
TeleMessage TM SGNL contains an exposure of core dump file to an unauthorized control sphere Vulnerability. This vulnerability is based on a JSP application in which the heap content is roughly equivalent to a "core dump" in which a password previously sent over HTTP would be included in this dump.
Affected Products
| Vendor | Product |
|---|---|
| TeleMessage | TM SGNL |
Patch Status
Patch by 2025-07-22
Recommended Actions
- Check if your systems use any of the affected products listed above.
- Apply vendor patches immediately if available.
- This vulnerability is in CISA's Known Exploited Vulnerabilities catalog — prioritize remediation.
- Monitor vendor advisories for updates and additional mitigations.
- Review logs for indicators of compromise related to CVE-2025-48928.