CVE-2025-5469

N/A Unknown

📋 TL;DR

This CVE describes a Search Order Hijacking vulnerability in Yandex Messenger (Telemost) on macOS, where an attacker can place a malicious library in a location that the application searches before legitimate system libraries. This affects macOS users running vulnerable versions of Yandex Messenger/Telemost.

💻 Affected Systems

Products:
  • Yandex Messenger
  • Telemost
Versions: before 2.245
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects macOS installations. Requires local access to place malicious files in search paths.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could execute arbitrary code with the privileges of the user running Yandex Messenger, potentially leading to full system compromise, data theft, or malware installation.

🟠

Likely Case

Local privilege escalation or execution of malicious code in the context of the user running the vulnerable application.

🟢

If Mitigated

Limited impact if proper library path controls and application sandboxing are enforced.

🌐 Internet-Facing: LOW - This is a local attack vector requiring access to the target system.
🏢 Internal Only: MEDIUM - Internal attackers with local access could exploit this for privilege escalation or lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to place malicious files. Standard search order hijacking techniques apply.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.245 or later

Vendor Advisory: https://yandex.com/bugbounty/i/hall-of-fame-products

Restart Required: Yes

Instructions:

1. Open Yandex Messenger/Telemost. 2. Check for updates in application settings. 3. Update to version 2.245 or later. 4. Restart the application.

🔧 Temporary Workarounds

Restrict library search paths

macOS

Use macOS security controls to restrict where applications can load libraries from

sudo spctl --master-enable
sudo spctl --enable --label "Developer ID"

Remove vulnerable versions

macOS

Uninstall vulnerable versions until patched version can be installed

sudo rm -rf /Applications/Yandex\ Messenger.app
sudo rm -rf /Applications/Telemost.app

🧯 If You Can't Patch

  • Restrict user permissions to prevent placing files in library search paths
  • Monitor for suspicious library loading behavior using endpoint detection tools

🔍 How to Verify

Check if Vulnerable:

Check Yandex Messenger/Telemost version in application settings or About dialog

Check Version:

defaults read /Applications/Yandex\ Messenger.app/Contents/Info.plist CFBundleShortVersionString

Verify Fix Applied:

Confirm version is 2.245 or higher in application settings

📡 Detection & Monitoring

Log Indicators:

  • Unusual library loading from non-standard paths in application logs
  • Console.app entries showing library loading errors

Network Indicators:

  • Not applicable - local attack vector

SIEM Query:

process_name:"Yandex Messenger" AND event_type:"library_load" AND NOT library_path:"/System/Library/*" AND NOT library_path:"/usr/lib/*"

🔗 References

📤 Share & Export