First published: Tue Jun 30 2020(Updated: )
If an attacker intercepts Thunderbird's initial attempt to perform automatic account setup using the Microsoft Exchange autodiscovery mechanism, and the attacker sends a crafted response, then Thunderbird sends username and password over https to a server controlled by the attacker.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <68.10 | 68.10 |
<68.10 | 68.10 | |
Mozilla Thunderbird | <68.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-15646 is a vulnerability that allows an attacker to intercept Thunderbird's automatic account setup and steal usernames and passwords.
CVE-2020-15646 occurs when an attacker intercepts Thunderbird's autodiscovery mechanism and sends a crafted response to steal user credentials.
CVE-2020-15646 has a severity rating of 5.9, which is considered high.
Mozilla Thunderbird versions up to and excluding 68.10.0 are affected by CVE-2020-15646.
To fix CVE-2020-15646, you should update Thunderbird to version 68.10 or higher, which contains the necessary security fixes.