CVE-2023-38686

CVSS 3.1 Score 9.3 of 10 (high)

Details

Published Aug 4, 2023
Updated: Aug 10, 2023
CWE ID 295

Summary

CVE-2023-38686 is a vulnerability in Sydent, an identity server for the Matrix communications protocol. Versions prior to 2.5.6 are affected by this vulnerability, which allows interception of Sydent's emails through a man-in-the-middle (MITM) attack if configured to send emails using TLS without verifying SMTP servers' certificates. Attackers with privileged network access can intercept room invitations and address confirmation emails. The vulnerability has been patched in Sydent 2.5.6, and organizations should ensure that the server certificate is trusted when applying the patch. As a workaround, one can prevent Sydent's emails from being sent by configuring the SMTP server to a loopback or non-routable address without a listening SMTP server. The vulnerability has a base severity score of 9.3 (CRITICAL) and high impact on confidentiality and integrity, according to the Common Vulnerability Scoring System (CVSS) version 3.1 rating provided by [email protected].

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-38686 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions