CVE-2026-33603
đļ mediumSummary
Attacker can use a specially crafted base64 exchange between Dovecot and Client to fake SCRAM TLS channel binding. This requires that the attacker is able to position itself between Dovecot and the client connection. If successful, the attacker can eavesdrop communications between Dovecot and client as MITM proxy. Install fixed version. No publicly available exploits are known.
CVSS Score
6.8
Medium
EPSS Score
0.0
Exploit Probability
Published Date
2026-05-12
First Seen: 2026-05-19
đ Relative Risk Intelligence
This CVE is Lower Risk - more severe than 48.9% of all 321,566 vulnerabilities in our database.
#164,380
Below average severity
Severity Percentile
đ¯ CISA SSVC Assessment Updated: May 12, 2026
đ Exploitation Status
None
No known exploits
âī¸ Automatable
NO
Requires human interaction
đĨ Technical Impact
Total
Complete system compromise possible
SSVC data provided by
CISA
Last Modified
2026-05-18
Source
NVD đ
CVSS Vector 3.1
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
CWE IDs (Weakness Types)