CVE-2020-14954

moderate-risk
Published 2020-06-21

Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."

Do I need to act?

~
5.8% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.9/10 Medium
NETWORK / HIGH complexity

References (32)

Third Party Advisory https://usn.ubuntu.com/4403-1/
and 12 more references
45
/ 100
moderate-risk
Severity 18/34 · Moderate
Exploitability 9/34 · Low
Exposure 18/34 · Moderate