CVE-2026-33603

medium

Description

Attacker can use a specially crafted base64 exchange between Dovecot and Client to fake SCRAM TLS channel binding. This requires that the attacker is able to position itself between Dovecot and the client connection. If successful, the attacker can eavesdrop communications between Dovecot and client as MITM proxy. Install fixed version. No publicly available exploits are known.

References

https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2026/oxdc-adv-2026-0002.json

Details

Source: Mitre, NVD

Published: 2026-05-12

Updated: 2026-05-12

Risk Information

CVSS v2

Base Score: 6.2

Vector: CVSS2#AV:A/AC:H/Au:N/C:C/I:C/A:N

Severity: Medium

CVSS v3

Base Score: 6.8

Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Severity: Medium