CVE-2019-10044
📋 TL;DR
This vulnerability allows attackers to create deceptive URLs using Internationalized Domain Name (IDN) homograph characters that appear identical to legitimate domains, enabling phishing attacks. It affects Telegram Desktop on Windows before version 1.5.12 and Telegram applications for Android, iOS, and Linux, potentially tricking users into clicking malicious links.
💻 Affected Systems
- Telegram Desktop
- Telegram for Android
- Telegram for iOS
- Telegram for Linux
📦 What is this software?
Telegram by Telegram
⚠️ Risk & Real-World Impact
Worst Case
Users could be redirected to malicious websites that steal credentials, install malware, or compromise personal data, leading to account takeover or financial loss.
Likely Case
Phishing attacks where users inadvertently click on spoofed URLs, resulting in credential harvesting or exposure to scams.
If Mitigated
If users are trained to verify URLs and applications are patched, the risk is reduced to minimal, with only low-impact incidents possible.
🎯 Exploit Status
Exploitation involves crafting URLs with homograph characters, which is straightforward and does not require authentication, making it accessible to attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.5.12 or later
Vendor Advisory: https://github.com/blazeinfosec/advisories/blob/master/telegram-advisory.txt
Restart Required: Yes
Instructions:
1. Open the Telegram application. 2. Check for updates in settings or app store. 3. Install version 1.5.12 or higher. 4. Restart the application to apply the patch.
🔧 Temporary Workarounds
Disable automatic link detection
allPrevents URLs from being automatically clickable in messages, reducing the risk of accidental clicks on malicious links.
Not applicable; configure in app settings under Privacy or Security options.
Use browser extensions for URL verification
allInstall extensions that highlight or warn about IDN homograph attacks when browsing.
Install from browser extension stores (e.g., Chrome Web Store).
🧯 If You Can't Patch
- Educate users to manually inspect URLs before clicking, especially for suspicious domains.
- Implement network filtering to block known malicious domains associated with homograph attacks.
🔍 How to Verify
Check if Vulnerable:
Check the application version in settings; if it is below 1.5.12, it is vulnerable.
Check Version:
On Telegram Desktop: Go to Settings > About; on mobile: Settings > Version.
Verify Fix Applied:
Confirm the application version is 1.5.12 or higher after updating.
📡 Detection & Monitoring
Log Indicators:
- Look for logs of users clicking on URLs with mixed character sets or domains flagged as suspicious.
Network Indicators:
- Monitor for connections to domains with homograph characters or known phishing sites.
SIEM Query:
Example: 'url:*cyrillic* OR url:*homograph*' to detect potential malicious links in logs.