SEPPmail Secure Email Gateway before version 15.0.1 incorrectly interprets email addresses in the email headers, causing an interpretation conflict with other mail infrastructure that allows an attacker to fake the source of the email or decrypt it.
References
| Link | Resource |
|---|---|
| https://downloads.seppmail.com/extrelnotes/150/ERN15.0.html#seppmail-vulnerability-disclosure | Vendor Advisory |
Configurations
History
05 Mar 2026, 15:34
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://downloads.seppmail.com/extrelnotes/150/ERN15.0.html#seppmail-vulnerability-disclosure - Vendor Advisory | |
| CPE | cpe:2.3:a:seppmail:seppmail:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| First Time |
Seppmail
Seppmail seppmail |
04 Mar 2026, 09:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-04 09:15
Updated : 2026-03-05 15:34
NVD link : CVE-2026-27444
Mitre link : CVE-2026-27444
CVE.ORG link : CVE-2026-27444
JSON object : View
Products Affected
seppmail
- seppmail
CWE
CWE-436
Interpretation Conflict
