Bypass of 2FA Protection in Mailcow's Dockerized Groupware/Email Suite
CVE-2024-41958

7.2HIGH

Key Information:

Vendor

Mailcow

Vendor
CVE Published:
5 August 2024

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC🟣 EPSS 30%

What is CVE-2024-41958?

A security flaw has been identified in the two-factor authentication (2FA) mechanism of the mailcow: dockerized email suite. This vulnerability enables an authenticated attacker to circumvent the 2FA process, allowing unauthorized access to accounts that are otherwise protected by this security feature. To exploit the vulnerability, the attacker needs to possess the credentials of the target account and must already have access to another account within the system. Upon exploiting this weakness, the attacker can freely bypass the 2FA protection, putting sensitive user information at risk. Users are strongly recommended to upgrade to the 2024-07 version to mitigate this issue, as there are currently no known workarounds.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

mailcow-dockerized < 2024-07

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

30% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.