First published: Thu Aug 20 2020(Updated: )
eM Client before 7.2.33412.0 automatically imported S/MIME certificates and thereby silently replaced existing ones. This allowed a man-in-the-middle attacker to obtain an email-validated S/MIME certificate from a trusted CA and replace the public key of the entity to be impersonated. This enabled the attacker to decipher further communication. The entire attack could be accomplished by sending a single email.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Emclient Em Client | <7.2.33412.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-12618 is medium with a CVSS score of 4.8.
CVE-2020-12618 impacts eM Client versions up to and including 7.2.33412.0.
CVE-2020-12618 is a vulnerability in eM Client that allows a man-in-the-middle attacker to obtain an email-validated S/MIME certificate from a trusted CA and replace the public key of the entity to be impersonated.
A man-in-the-middle attacker can exploit CVE-2020-12618 by obtaining an email-validated S/MIME certificate from a trusted CA and replacing the public key of the entity to be impersonated.
To fix CVE-2020-12618, users should update to eM Client version 7.2.33412.0 or newer.