Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 19 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Fake SCRAM TLS Channel Binding Allows MITM Eavesdropping in OX Dovecot Pro | dovecot: Dovecot: Information disclosure via SCRAM TLS channel binding bypass |
| Weaknesses | CWE-940 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 18 May 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dovecot
Dovecot dovecot Open-xchange dovecot |
|
| CPEs | cpe:2.3:a:dovecot:dovecot:*:*:*:*:*:*:*:* cpe:2.3:a:open-xchange:dovecot:*:*:*:*:pro:*:*:* |
|
| Vendors & Products |
Dovecot
Dovecot dovecot Open-xchange dovecot |
Tue, 12 May 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Fake SCRAM TLS Channel Binding Allows MITM Eavesdropping in OX Dovecot Pro | |
| First Time appeared |
Open-xchange
Open-xchange ox Dovecot Pro |
|
| Vendors & Products |
Open-xchange
Open-xchange ox Dovecot Pro |
Tue, 12 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Attacker can use a specially crafted base64 exchange between Dovecot and Client to fake SCRAM TLS channel binding. This requires that the attacker is able to position itself between Dovecot and the client connection. If successful, the attacker can eavesdrop communications between Dovecot and client as MITM proxy. Install fixed version. No publicly available exploits are known. | |
| Weaknesses | CWE-99 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: OX
Published:
Updated: 2026-05-12T15:08:00.334Z
Reserved: 2026-03-23T12:58:38.266Z
Link: CVE-2026-33603
Updated: 2026-05-12T15:07:55.507Z
Status : Analyzed
Published: 2026-05-12T14:17:01.600
Modified: 2026-05-18T17:35:35.650
Link: CVE-2026-33603
OpenCVE Enrichment
Updated: 2026-05-19T02:00:14Z