A 2-Step Verification problem in Axigen 10.3.3.52 allows an attacker to access a mailbox by bypassing 2-Step Verification when they try to add an account to any third-party webmail service (or add an account to Outlook or Gmail, etc.) with IMAP or POP3 without any verification code.
References
Link | Resource |
---|---|
https://github.com/umz-cert/vulnerabilities/issues/1 | Third Party Advisory |
https://github.com/umz-cert/vulnerabilitys/blob/patch-1/Axigen%20Mail%20Server%2010.3.3.52%202-Step%20verification | Third Party Advisory |
https://www.axigen.com/documentation/2-step-verification-two-factor-authentication-for-webmail-p69140479 | Technical Description Vendor Advisory |
https://www.axigen.com/mail-server/download/ | Vendor Advisory |
https://github.com/umz-cert/vulnerabilities/issues/1 | Third Party Advisory |
https://github.com/umz-cert/vulnerabilitys/blob/patch-1/Axigen%20Mail%20Server%2010.3.3.52%202-Step%20verification | Third Party Advisory |
https://www.axigen.com/documentation/2-step-verification-two-factor-authentication-for-webmail-p69140479 | Technical Description Vendor Advisory |
https://www.axigen.com/mail-server/download/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 07:46
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-01-13 04:15
Updated : 2024-11-21 07:46
NVD link : CVE-2023-23566
Mitre link : CVE-2023-23566
CVE.ORG link : CVE-2023-23566
JSON object : View
Products Affected
axigen
- axigen_mail_server
CWE