Description
Enterprise Protection contains an improper input validation vulnerability in attachment defense that allows an unauthenticated remote attacker to bypass attachment scanning security policy by sending a malicious S/MIME attachment with an opaque signature. When opened by a recipient in a downstream email client, the malicious attachment could cause partial loss of integrity and confidentiality to their system.
Published: 2025-04-28
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-54529 Enterprise Protection contains an improper input validation vulnerability in attachment defense that allows an unauthenticated remote attacker to bypass attachment scanning security policy by sending a malicious S/MIME attachment with an opaque signature. When opened by a recipient in a downstream email client, the malicious attachment could cause partial loss of integrity and confidentiality to their system.
History

Mon, 06 Oct 2025 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Mon, 06 Oct 2025 21:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-754

Sat, 10 May 2025 01:15:00 +0000

Type Values Removed Values Added
First Time appeared Proofpoint
Proofpoint enterprise Protection
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:proofpoint:enterprise_protection:8.18.6:*:*:*:-:*:*:*
cpe:2.3:a:proofpoint:enterprise_protection:8.20.6:*:*:*:-:*:*:*
cpe:2.3:a:proofpoint:enterprise_protection:8.21.0:*:*:*:-:*:*:*
Vendors & Products Proofpoint
Proofpoint enterprise Protection

Mon, 28 Apr 2025 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 28 Apr 2025 20:45:00 +0000

Type Values Removed Values Added
Description Enterprise Protection contains an improper input validation vulnerability in attachment defense that allows an unauthenticated remote attacker to bypass attachment scanning security policy by sending a malicious S/MIME attachment with an opaque signature. When opened by a recipient in a downstream email client, the malicious attachment could cause partial loss of integrity and confidentiality to their system.
Title Enterprise Protection S/MIME Opaque Signature Attachment Scanning Bypass
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Proofpoint Enterprise Protection
cve-icon MITRE

Status: PUBLISHED

Assigner: Proofpoint

Published:

Updated: 2025-10-06T20:51:36.637Z

Reserved: 2024-10-31T18:23:56.308Z

Link: CVE-2024-10635

cve-icon Vulnrichment

Updated: 2025-04-28T22:28:35.658Z

cve-icon NVD

Status : Modified

Published: 2025-04-28T21:15:56.427

Modified: 2025-10-06T21:15:32.307

Link: CVE-2024-10635

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses