{"api_version":"1","generated_at":"2026-04-23T01:31:47+00:00","cve":"CVE-2020-28896","urls":{"html":"https://cve.report/CVE-2020-28896","api":"https://cve.report/api/cve/CVE-2020-28896.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-28896","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-28896"},"summary":{"title":"CVE-2020-28896","description":"Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server's initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an unencrypted connection, or to a machine-in-the-middle.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2020-11-23 19:15:00","updated_at":"2021-07-21 11:39:00"},"problem_types":["CWE-287","CWE-755"],"metrics":[],"references":[{"url":"https://github.com/neomutt/neomutt/releases/tag/20201120","name":"https://github.com/neomutt/neomutt/releases/tag/20201120","refsource":"MISC","tags":["Release Notes","Third Party Advisory"],"title":"Release NeoMutt 2020-11-20 · neomutt/neomutt · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/neomutt/neomutt/commit/9c36717a3e2af1f2c1b7242035455ec8112b4b06","name":"https://github.com/neomutt/neomutt/commit/9c36717a3e2af1f2c1b7242035455ec8112b4b06","refsource":"MISC","tags":["Patch","Third Party Advisory"],"title":"imap: close connection on all failures · neomutt/neomutt@9c36717 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00048.html","name":"[debian-lts-announce] 20201130 [SECURITY] [DLA 2472-1] mutt security update","refsource":"MLIST","tags":["Mailing List","Third Party Advisory"],"title":"[SECURITY] [DLA 2472-1] mutt security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://gitlab.com/muttmua/mutt/-/commit/04b06aaa3e0cc0022b9b01dbca2863756ebbf59a","name":"https://gitlab.com/muttmua/mutt/-/commit/04b06aaa3e0cc0022b9b01dbca2863756ebbf59a","refsource":"MISC","tags":["Patch","Third Party Advisory"],"title":"Ensure IMAP connection is closed after a connection error. (04b06aaa) · Commits · Mutt Project / mutt · GitLab","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/202101-32","name":"GLSA-202101-32","refsource":"GENTOO","tags":["Third Party Advisory"],"title":"Mutt, NeoMutt: Information disclosure (GLSA 202101-32) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://gitlab.com/muttmua/mutt/-/commit/d92689088dfe80a290ec836e292376e2d9984f8f","name":"https://gitlab.com/muttmua/mutt/-/commit/d92689088dfe80a290ec836e292376e2d9984f8f","refsource":"MISC","tags":["Patch","Third Party Advisory"],"title":"automatic post-release commit for mutt-2.0.2 (d9268908) · Commits · Mutt Project / mutt · GitLab","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-28896","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-28896","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"28896","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"28896","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"28896","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mutt","cpe5":"mutt","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"28896","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mutt","cpe5":"mutt","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"28896","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"neomutt","cpe5":"neomutt","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"28896","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"neomutt","cpe5":"neomutt","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-28896","qid":"159902","title":"Oracle Enterprise Linux Security Update for mutt (ELSA-2021-4181)"},{"cve":"CVE-2020-28896","qid":"239818","title":"Red Hat Update for mutt security (RHSA-2021:4181)"},{"cve":"CVE-2020-28896","qid":"354118","title":"Amazon Linux Security Advisory for mutt : ALAS2-2022-1892"},{"cve":"CVE-2020-28896","qid":"501632","title":"Alpine Linux Security Update for mutt"},{"cve":"CVE-2020-28896","qid":"670191","title":"EulerOS Security Update for mutt (EulerOS-SA-2021-1690)"},{"cve":"CVE-2020-28896","qid":"690396","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for mutt (dc132c91-2b71-11eb-8cfd-4437e6ad11c4)"},{"cve":"CVE-2020-28896","qid":"750523","title":"OpenSUSE Security Update for mutt (openSUSE-SU-2020:2141-1)"},{"cve":"CVE-2020-28896","qid":"750529","title":"OpenSUSE Security Update for mutt (openSUSE-SU-2020:2128-1)"},{"cve":"CVE-2020-28896","qid":"750531","title":"OpenSUSE Security Update for neomutt (openSUSE-SU-2020:2127-1)"},{"cve":"CVE-2020-28896","qid":"940384","title":"AlmaLinux Security Update for mutt (ALSA-2021:4181)"},{"cve":"CVE-2020-28896","qid":"960372","title":"Rocky Linux Security Update for mutt (RLSA-2021:4181)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2020-28896","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server's initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an unencrypted connection, or to a machine-in-the-middle."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://gitlab.com/muttmua/mutt/-/commit/d92689088dfe80a290ec836e292376e2d9984f8f","url":"https://gitlab.com/muttmua/mutt/-/commit/d92689088dfe80a290ec836e292376e2d9984f8f"},{"refsource":"MISC","name":"https://gitlab.com/muttmua/mutt/-/commit/04b06aaa3e0cc0022b9b01dbca2863756ebbf59a","url":"https://gitlab.com/muttmua/mutt/-/commit/04b06aaa3e0cc0022b9b01dbca2863756ebbf59a"},{"refsource":"MISC","name":"https://github.com/neomutt/neomutt/commit/9c36717a3e2af1f2c1b7242035455ec8112b4b06","url":"https://github.com/neomutt/neomutt/commit/9c36717a3e2af1f2c1b7242035455ec8112b4b06"},{"refsource":"MISC","name":"https://github.com/neomutt/neomutt/releases/tag/20201120","url":"https://github.com/neomutt/neomutt/releases/tag/20201120"},{"refsource":"MLIST","name":"[debian-lts-announce] 20201130 [SECURITY] [DLA 2472-1] mutt security update","url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00048.html"},{"refsource":"GENTOO","name":"GLSA-202101-32","url":"https://security.gentoo.org/glsa/202101-32"}]}},"nvd":{"publishedDate":"2020-11-23 19:15:00","lastModifiedDate":"2021-07-21 11:39:00","problem_types":["CWE-287","CWE-755"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.6,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":2.6},"severity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:neomutt:neomutt:*:*:*:*:*:*:*:*","versionEndExcluding":"2020-11-20","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*","versionEndExcluding":"2.0.2","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"28896","Ordinal":"191958","Title":"CVE-2020-28896","CVE":"CVE-2020-28896","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"28896","Ordinal":"1","NoteData":"Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server's initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an unencrypted connection, or to a machine-in-the-middle.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"28896","Ordinal":"2","NoteData":"2020-11-23","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"28896","Ordinal":"3","NoteData":"2021-01-26","Type":"Other","Title":"Modified"}]}}}