Lucene search

K
cve[email protected]CVE-2023-46116
HistoryDec 15, 2023 - 2:15 p.m.

CVE-2023-46116

2023-12-1514:15:14
CWE-20
web.nvd.nist.gov
10
tutanota
cve-2023-46116
email security
code execution
vulnerability
patch
nvd

9.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

8.8 High

AI Score

Confidence

High

0.008 Low

EPSS

Percentile

81.8%

Tutanota (Tuta Mail) is an encrypted email provider. Tutanota allows users to open links in emails in external applications. Prior to version 3.118.12, it correctly blocks the file: URL scheme, which can be used by malicious actors to gain code execution on a victims computer, however fails to check other harmful schemes such as ftp:, smb:, etc. which can also be used. Successful exploitation of this vulnerability will enable an attacker to gain code execution on a victim’s computer. Version 3.118.2 contains a patch for this issue.

Affected configurations

Vulners
NVD
Node
tutaotutanotaRange<3.118.12
CPENameOperatorVersion
tuta:tutanotatuta tutanotalt3.118.12

CNA Affected

[
  {
    "vendor": "tutao",
    "product": "tutanota",
    "versions": [
      {
        "version": "< 3.118.12",
        "status": "affected"
      }
    ]
  }
]

9.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

8.8 High

AI Score

Confidence

High

0.008 Low

EPSS

Percentile

81.8%

Related for CVE-2023-46116