5.9
CVSSv3

CVE-2017-17689

Published: 16/05/2018 Updated: 03/10/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

The S/MIME specification allows a Cipher Block Chaining (CBC) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL.

Vulnerable Product Search on Vulmon Subscribe to Product

gnome evolution -

mozilla thunderbird -

ibm notes -

emclient emclient -

horde horde imp -

9folders nine -

freron mailmate -

kde kmail -

ritlabs the bat -

microsoft outlook 2013

flipdogsolutions maildroid -

r2mail2 r2mail2 -

apple mail -

bloop airmail -

microsoft outlook 2010

microsoft outlook 2007

google gmail -

kde trojita -

postbox-inc postbox -

microsoft outlook 2016

Vendor Advisories

The S/MIME specification allows a Cipher Block Chaining (CBC) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL ...

Github Repositories

Exploiting Efail vulnerability in e.g. in Thunderbird

Efail-malleability-gadget-exploit This project provides code to exploit the malleability CFB (CVE-2017-17688) and CBC gadgets (CVE-2017-17689) published by Efail and made available for penetration testing The documentation with all side notes and a detailed introduction can be fount in HTML here or as PDF here Also a summary in form as a presentation can be found here The fi

Recent Articles

S/MIME artists: EFAIL email app flaws menace PGP-encrypted chats
The Register • Shaun Nichols in San Francisco • 14 May 2018

If a hacker can get into your inbox of ciphered messages, they may be able to read the content PGP and S/MIME decryptors can leak plaintext from emails, says infosec Professor

Security researchers have gone public with vulnerabilities in some secure mail apps that can be exploited by miscreants to decrypt intercepted PGP-encrypted messages. The flaws, collectively dubbed EFAIL, are present in the way some email clients handle PGP and S/MIME encrypted messages. By taking advantage of the way the applications handle HTML content of these messages, an attacker could potentially see encrypted messages as plaintext. In other words, decrypt your secret emails. The research ...