No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 12 May 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Fake SCRAM TLS Channel Binding Allows MITM Eavesdropping in OX Dovecot Pro | |
| First Time appeared |
Open-xchange
Open-xchange ox Dovecot Pro |
|
| Vendors & Products |
Open-xchange
Open-xchange ox Dovecot Pro |
Tue, 12 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Attacker can use a specially crafted base64 exchange between Dovecot and Client to fake SCRAM TLS channel binding. This requires that the attacker is able to position itself between Dovecot and the client connection. If successful, the attacker can eavesdrop communications between Dovecot and client as MITM proxy. Install fixed version. No publicly available exploits are known. | |
| Weaknesses | CWE-99 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: OX
Published:
Updated: 2026-05-12T15:08:00.334Z
Reserved: 2026-03-23T12:58:38.266Z
Link: CVE-2026-33603
Updated: 2026-05-12T15:07:55.507Z
Status : Awaiting Analysis
Published: 2026-05-12T14:17:01.600
Modified: 2026-05-12T15:08:22.857
Link: CVE-2026-33603
No data.
OpenCVE Enrichment
Updated: 2026-05-12T15:30:18Z