{"api_version":"1","generated_at":"2026-05-13T07:41:00+00:00","cve":"CVE-2026-33603","urls":{"html":"https://cve.report/CVE-2026-33603","api":"https://cve.report/api/cve/CVE-2026-33603.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-33603","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-33603"},"summary":{"title":"CVE-2026-33603","description":"Attacker can use a specially crafted base64 exchange between Dovecot and Client to fake SCRAM TLS channel binding. This requires that the attacker is able to position itself between Dovecot and the client connection. If successful, the attacker can eavesdrop communications between Dovecot and client as MITM proxy. Install fixed version. No publicly available exploits are known.","state":"PUBLISHED","assigner":"OX","published_at":"2026-05-12 14:17:01","updated_at":"2026-05-12 15:08:22"},"problem_types":["CWE-99","CWE-99 Improper Control of Resource Identifiers ('Resource Injection')"],"metrics":[{"version":"3.1","source":"security@open-xchange.com","type":"Secondary","score":"6.8","severity":"MEDIUM","vector":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"6.8","severity":"MEDIUM","vector":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","data":{"attackComplexity":"HIGH","attackVector":"ADJACENT_NETWORK","availabilityImpact":"NONE","baseScore":6.8,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","version":"3.1"}}],"references":[{"url":"https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2026/oxdc-adv-2026-0002.json","name":"https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2026/oxdc-adv-2026-0002.json","refsource":"security@open-xchange.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-33603","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33603","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Open-Xchange GmbH","product":"OX Dovecot Pro","version":"affected 3.1.0 semver","platforms":[]},{"source":"CNA","vendor":"Open-Xchange GmbH","product":"OX Dovecot Pro","version":"affected 2.4.0 semver","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["core"],"product":"OX Dovecot Pro","vendor":"Open-Xchange GmbH","versions":[{"lessThanOrEqual":"3.1.0","status":"affected","version":"0","versionType":"semver"},{"lessThanOrEqual":"2.4.0","status":"affected","version":"0","versionType":"semver"}]}],"descriptions":[{"lang":"en","value":"Attacker can use a specially crafted base64 exchange between Dovecot and Client to fake SCRAM TLS channel binding. This requires that the attacker is able to position itself between Dovecot and the client connection. If successful, the attacker can eavesdrop communications between Dovecot and client as MITM proxy. Install fixed version. No publicly available exploits are known."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"ADJACENT_NETWORK","availabilityImpact":"NONE","baseScore":6.8,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-99","description":"Improper Control of Resource Identifiers ('Resource Injection')","lang":"en","type":"cwe"}]}],"providerMetadata":{"dateUpdated":"2026-05-12T13:39:01.528Z","orgId":"8ce71d90-2354-404b-a86e-bec2cc4e6981","shortName":"OX"},"references":[{"tags":["vendor-advisory"],"url":"https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2026/oxdc-adv-2026-0002.json"}],"source":{"defect":"DOV-9030","discovery":"EXTERNAL"}}},"cveMetadata":{"assignerOrgId":"8ce71d90-2354-404b-a86e-bec2cc4e6981","assignerShortName":"OX","cveId":"CVE-2026-33603","datePublished":"2026-05-12T13:28:44.802Z","dateReserved":"2026-03-23T12:58:38.266Z","dateUpdated":"2026-05-12T13:39:01.528Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-12 14:17:01","lastModifiedDate":"2026-05-12 15:08:22","problem_types":["CWE-99","CWE-99 Improper Control of Resource Identifiers ('Resource Injection')"],"metrics":{"cvssMetricV31":[{"source":"security@open-xchange.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":5.2}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"33603","Ordinal":"1","Title":"CVE-2026-33603","CVE":"CVE-2026-33603","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"33603","Ordinal":"1","NoteData":"Attacker can use a specially crafted base64 exchange between Dovecot and Client to fake SCRAM TLS channel binding. This requires that the attacker is able to position itself between Dovecot and the client connection. If successful, the attacker can eavesdrop communications between Dovecot and client as MITM proxy. Install fixed version. No publicly available exploits are known.","Type":"Description","Title":"CVE-2026-33603"}]}}}