Vulnerability Description
PGP/MIME encrypted messages injected into a Vaultive O365 (before 4.5.21) frontend via IMAP or SMTP have their Content-Type changed from 'Content-Type: multipart/encrypted; protocol="application/pgp-encrypted"; boundary="abc123abc123"' to 'Content-Type: text/plain' - this results in the encrypted message being structured in such a way that most PGP/MIME-capable mail user agents are unable to decrypt it cleanly. The outcome is that encrypted mail passing through this device does not work (Denial of Service), and a common real-world consequence is a request to resend the mail in the clear (Information Disclosure).
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vaultive | Office 365 Security | 4.5.19 |
Related Weaknesses (CWE)
References
- https://gist.github.com/dkg/a1998c861bf2430e0d01d586905b11cb
- https://gist.github.com/dkg/a1998c861bf2430e0d01d586905b11cb
FAQ
What is CVE-2017-7229?
CVE-2017-7229 is a vulnerability with a CVSS score of 9.1 (CRITICAL). PGP/MIME encrypted messages injected into a Vaultive O365 (before 4.5.21) frontend via IMAP or SMTP have their Content-Type changed from 'Content-Type: multipart/encrypted; protocol="application/pgp-e...
How severe is CVE-2017-7229?
CVE-2017-7229 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-7229?
Check the references section above for vendor advisories and patch information. Affected products include: Vaultive Office 365 Security.