CVE-2024-7014

8.1 HIGH

📋 TL;DR

The EvilVideo vulnerability in Telegram for Android allows attackers to send malicious applications disguised as video files. When users open these files, they can execute arbitrary code on the device. This affects Telegram for Android versions 10.14.4 and older.

💻 Affected Systems

Products:
  • Telegram for Android
Versions: 10.14.4 and older
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected Telegram versions are vulnerable. No special settings required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise allowing data theft, surveillance, ransomware deployment, and persistence through malicious app installation.

🟠

Likely Case

Malware installation leading to credential theft, financial fraud, and unauthorized access to device data and communications.

🟢

If Mitigated

Limited impact if users avoid opening suspicious video files from untrusted sources and have updated Telegram.

🌐 Internet-Facing: HIGH - Attackers can exploit remotely via Telegram messaging without user interaction beyond opening the malicious file.
🏢 Internal Only: MEDIUM - Risk exists within organizational Telegram groups but requires user interaction with malicious content.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires sending a malicious file and convincing the user to open it. ESET researchers have confirmed active exploitation in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.14.5 and newer

Vendor Advisory: https://telegram.org/blog/evilvideo-vulnerability-fix

Restart Required: No

Instructions:

1. Open Google Play Store 2. Search for Telegram 3. Tap Update if available 4. Alternatively, download latest version from Telegram.org

🔧 Temporary Workarounds

Disable automatic media download

android

Prevents automatic download of suspicious video files that could contain the exploit

Settings > Data and Storage > Auto-Download Media > Disable all options

Restrict message sources

android

Only accept messages from known contacts to reduce exposure

Settings > Privacy and Security > Groups & Channels > Set to 'My Contacts'

🧯 If You Can't Patch

  • Avoid opening video files from unknown or untrusted Telegram contacts
  • Use Telegram Web or desktop clients which are not affected by this Android-specific vulnerability

🔍 How to Verify

Check if Vulnerable:

Check Telegram version in Settings > About Telegram. If version is 10.14.4 or lower, you are vulnerable.

Check Version:

Not applicable - check via Telegram app settings

Verify Fix Applied:

Update to Telegram 10.14.5 or newer and verify version in Settings > About Telegram.

📡 Detection & Monitoring

Log Indicators:

  • Unusual APK installation events from Telegram
  • Telegram downloading unusually named video files with .apk extensions

Network Indicators:

  • Telegram downloading files with video MIME types but APK content
  • Unusual outbound connections from Telegram to unknown servers

SIEM Query:

source="android" AND (event="app_install" AND package_name LIKE "%.apk" AND process="org.telegram.messenger") OR (process="org.telegram.messenger" AND file_download LIKE "%.mp4" OR file_download LIKE "%.avi")

🔗 References

📤 Share & Export