Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-27855

Опубликовано: 27 мар. 2026
Источник: redhat
CVSS3: 6.8
EPSS Низкий

Описание

Dovecot OTP authentication is vulnerable to replay attack under specific conditions. If auth cache is enabled, and username is altered in passdb, then OTP credentials can be cached so that same OTP reply is valid. An attacker able to observe an OTP exchange is able to log in as the user. If authentication happens over unsecure connection, switch to SCRAM protocol. Alternatively ensure the communcations are secured, and if possible switch to OAUTH2 or SCRAM. No publicly available exploits are known.

A flaw was found in Dovecot. Under specific conditions, if the authentication cache is enabled and the username is altered in the password database, Dovecot's One-Time Password (OTP) authentication is vulnerable to a replay attack. A remote attacker able to observe an OTP exchange can exploit this flaw to log in as the legitimate user, leading to unauthorized access.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10dovecotNot affected
Red Hat Enterprise Linux 6dovecotOut of support scope
Red Hat Enterprise Linux 7dovecotFix deferred
Red Hat Enterprise Linux 8dovecotNot affected
Red Hat Enterprise Linux 9dovecotNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-294
https://bugzilla.redhat.com/show_bug.cgi?id=2452177dovecot: Dovecot: Replay attack allows unauthorized login via observed One-Time Password (OTP) exchange

EPSS

Процентиль: 11%
0.00038
Низкий

6.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.8
nvd
5 дней назад

Dovecot OTP authentication is vulnerable to replay attack under specific conditions. If auth cache is enabled, and username is altered in passdb, then OTP credentials can be cached so that same OTP reply is valid. An attacker able to observe an OTP exchange is able to log in as the user. If authentication happens over unsecure connection, switch to SCRAM protocol. Alternatively ensure the communcations are secured, and if possible switch to OAUTH2 or SCRAM. No publicly available exploits are known.

CVSS3: 6.8
debian
5 дней назад

Dovecot OTP authentication is vulnerable to replay attack under specif ...

CVSS3: 6.8
github
5 дней назад

Dovecot OTP authentication is vulnerable to replay attack under specific conditions. If auth cache is enabled, and username is altered in passdb, then OTP credentials can be cached so that same OTP reply is valid. An attacker able to observe an OTP exchange is able to log in as the user. If authentication happens over unsecure connection, switch to SCRAM protocol. Alternatively ensure the communcations are secured, and if possible switch to OAUTH2 or SCRAM. No publicly available exploits are known.

EPSS

Процентиль: 11%
0.00038
Низкий

6.8 Medium

CVSS3