Vulnerability Details : CVE-2023-23566
A 2-Step Verification problem in Axigen 10.3.3.52 allows an attacker to access a mailbox by bypassing 2-Step Verification when they try to add an account to any third-party webmail service (or add an account to Outlook or Gmail, etc.) with IMAP or POP3 without any verification code.
Products affected by CVE-2023-23566
- cpe:2.3:a:axigen:axigen_mail_server:10.3.3.52:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-23566
0.34%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-23566
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
References for CVE-2023-23566
-
https://github.com/umz-cert/vulnerabilities/issues/1
Axigen Mail server 10.3.3.52 Two-Step verification · Issue #1 · umz-cert/vulnerabilities · GitHubThird Party Advisory
-
https://www.axigen.com/documentation/2-step-verification-two-factor-authentication-for-webmail-p69140479
2-Step Verification (Two Factor Authentication) for WebMail | Axigen DocumentationTechnical Description;Vendor Advisory
-
https://www.axigen.com/mail-server/download/
Download Mail Server | AxigenVendor Advisory
-
https://github.com/umz-cert/vulnerabilitys/blob/patch-1/Axigen%20Mail%20Server%2010.3.3.52%202-Step%20verification
vulnerabilitys/Axigen Mail Server 10.3.3.52 2-Step verification at patch-1 · umz-cert/vulnerabilitys · GitHubThird Party Advisory
Jump to