Teamwire Pass Code Bypass

A pass code bypass in the mobile application of Teamwire for Android allows an attacker with physical access to the phone to use the app without entering the valid pass code.

View the full advisory

                                           Telekom Security

                                   Advisory: Teamwire Pass Code Bypass
                               Release Date: 2020/08/31
                                     Author: Bastian Recktenwald (
                                        CVE: CVE-2020-12621

                                Application: Teamwire (Android App)
                                       Risk: Medium 


  Teamwire is a secure messenger for companies, authorities and healtcare. The complete description 
  of the app could be found in the official app store: 
  During a penetration test of the mobile application Teamwire for Android, a vulnerability 
  could be identified. To exploit the vulnerability in a sensible way, an attack must have physical 
  access to the mobile phone. The vulnerability was fixed with version 5.4.3.


  The App can be additionally protected with a pass code to improve the access security of the app. 
  The found vulnerability allows an attacker to bypass the pass code protection mechanism. In order to 
  exploit the vulnerability, an attacker can bypass the pass code by starting the exposed 
  activity “LoadingActivity“. Afterwards the app could be used without any restrictions.
  For example, new messages could be written or existing messages could be read. 

Disclosure Timeline:

  30. April  2020 - Notified vendor
  11. Mai    2020 - Vulnerability was fixed
  10. Juni   2020 - Release of version 5.4.3

About Telekom Security:

  Telekom Security is the security provider for Deutsche Telekom and Deutsche Telekom customers.