We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-10635

Enterprise Protection S/MIME Opaque Signature Attachment Scanning Bypass



Description

Enterprise Protection contains an improper input validation vulnerability in attachment defense that allows an unauthenticated remote attacker to bypass attachment scanning security policy by sending a malicious S/MIME attachment with an opaque signature. When opened by a recipient in a downstream email client, the malicious attachment could cause partial loss of integrity and confidentiality to their system.

Reserved 2024-10-31 | Published 2025-04-28 | Updated 2025-04-28 | Assigner Proofpoint


MEDIUM: 6.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-20 Improper Input Validation

Product status

Default status
affected

8.18.6 before patch 5110
affected

8.20.6 before patch 5134
affected

8.21.0 before patch 5112
affected

References

www.proofpoint.com/.../security-advisories/pfpt-sa-2025-0002

cve.org (CVE-2024-10635)

nvd.nist.gov (CVE-2024-10635)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-10635

Support options

Helpdesk Chat, Email, Knowledgebase