A critical zero-click vulnerability affects Telegram on Android and Linux, allowing remote code execution through simple animated stickers. No user interaction is required: merely receiving the content is enough to trigger the attack. The risk is immediate and tangible, potentially leading to device compromise, exposure of sensitive data, and full attacker control. Until a patch is released, both users and organizations must adopt drastic mitigation measures to reduce their exposure.
There is something deeply unsettling about this vulnerability: no click is required, nothing needs to be opened. Simply receiving the content is enough. Researchers from the Trend Micro Zero Day Initiative (ZDI) have identified a Remote Code Execution flaw with a CVSS score of 9.8 affecting Telegram on Android and Linux.
The attack vector is surprisingly simple: animated stickers. Specially crafted media files that, once delivered, automatically trigger the execution of malicious code. No confirmation, no user interaction. The system processes the files to generate previews, and it is precisely during this stage that the attack occurs.
The consequences are serious. An attacker could potentially gain full control of the device. This goes far beyond superficial access: messages, contacts, and active sessions may all become exposed. It is essentially a door left wide open—one that the user cannot even see.
This is not a minor bug. Its zero-click nature makes it particularly dangerous, especially in environments where communication flows continuously and messages are processed automatically.
No Indicators of Compromise (IoCs) have been released so far, which makes it significantly harder to detect whether systems may have already been targeted.
Mitigations: Between Trade-offs and Drastic Choices
This is where things become uncomfortable. The available mitigations are not elegant—but they are necessary.
For business users, the first line of defense is reducing the attack surface: restrict message reception to trusted contacts or Premium users only. This clearly affects communication workflows, but it lowers the exposure risk.
For the general public, the situation is more complicated. Disabling automatic downloads is not sufficient. Sticker parsing still occurs at the system level.
That leaves two imperfect options:
Temporarily uninstall the application, or
Use the web version of Telegram through an up-to-date browser.
The second option leverages the sandbox architecture of modern browsers, which provides a stronger isolation layer compared to the native client. It is not a perfect solution, but it is safer than continuing to use a vulnerable client.
Why This Vulnerability Matters in the Zero-Day Ecosystem
One important aspect is often overlooked when discussing critical vulnerabilities. Within the framework of the Trend Micro Zero Day Initiative, exploits are not circulated freely and are not treated as commodities to be sold to the highest bidder—such as through zero-day brokers or private offensive security organizations.
The program follows strict rules: discoveries are handled through responsible disclosure processes, with the goal of enabling a fix through Coordinated Vulnerability Disclosure (CVD).
This is fundamentally different from what happens in underground markets. In those environments, vulnerabilities of this kind can become high-value criminal assets, capable of generating enormous profits. Reliable zero-click exploits, particularly on widely used communication platforms like Telegram, can be worth millions of euros in clandestine circles.
Programs like the Trend Micro Zero Day Initiative exist precisely to prevent that scenario—bringing these discoveries into a regulated framework where the risk can be managed before it ends up in the wrong hands.
Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.
Carolina Vivianti is an independent cybersecurity consultant/advisor with experience in the tech and security sectors. She has worked as a Security Advisor for Ford EU/Ford Motor Company and Vodafone, and studied at Sapienza University of Rome.
Areas of Expertise:Cybersecurity, IT Risk Management, Security Advisory, Threat Analysis, Data Protection, Cloud Security, Compliance & Governance
Ritorna lunedì 18 e martedì 19 maggio la Red Hot Cyber Conference 2026, l’evento gratuito creato dalla community di Red Hot Cyber, che si terrà a Roma in Via Bari 18, presso il Teatro Italia. L’iniziativa è pensata per promuovere la cultura della sicurezza informatica, dell’innovazione digitale e della consapevolezza del rischio cyber. Rappresenta un punto di incontro tra professionisti, studenti, aziende e appassionati del settore, offrendo contenuti tecnici, workshop e momenti di confronto ad alto valore formativo.
L’edizione 2026 si svolgerà a Roma nelle giornate del 18 e 19 maggio presso il Teatro Italia e includerà attività formative, sessioni pratiche e la tradizionale Capture The Flag. L’evento è completamente gratuito, ma la partecipazione è subordinata a registrazione obbligatoria tramite i canali ufficiali, al fine di garantire una corretta organizzazione e gestione degli accessi.
Le iscrizioni saranno disponibili a partire dal 16 marzo 2026 attraverso la piattaforma Eventbrite, dove sarà possibile registrarsi ai diversi percorsi dell’evento: workshop, conferenza principale e competizione CTF. I link ufficiali di registrazione saranno pubblicati sui canali di Red Hot Cyber e costituiranno l’unico punto valido per la prenotazione dei posti all’evento.