An issue in the SharedConfig class of Telegram Android APK v.11.7.0 allows a physically proximate attacker to bypass authentication and escalate privileges by manipulating the return value of the checkPasscode method.
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.