Home

Description

Attacker can use a specially crafted base64 exchange between Dovecot and Client to fake SCRAM TLS channel binding. This requires that the attacker is able to position itself between Dovecot and the client connection. If successful, the attacker can eavesdrop communications between Dovecot and client as MITM proxy. Install fixed version. No publicly available exploits are known.

PUBLISHED Reserved 2026-03-23 | Published 2026-05-12 | Updated 2026-05-12 | Assigner OX




MEDIUM: 6.8CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Problem types

Improper Control of Resource Identifiers ('Resource Injection')

Product status

Default status
unaffected

Any version
affected

Any version
affected

References

documentation.open-xchange.com/...26/oxdc-adv-2026-0002.json vendor-advisory

cve.org (CVE-2026-33603)

nvd.nist.gov (CVE-2026-33603)

Download JSON