Impact
Mesalvo Meona components lack adequate verification of data authenticity, allowing an attacker to craft messages that appear to originate from any email address. This vulnerability, identified as CWE-345, can lead to phishing, unauthorized communication, and erosion of trust in the affected systems. The primary impact is the ability for malicious actors to send emails to any destination that seem legitimate, potentially compromising reputational or operational integrity.
Affected Systems
Mesalvo’s Meona Client Launcher Component through version 19.06.2020 15:11:49 and Meona Server Component through 2025.04 5+323020 are affected by this flaw, as specified by the vendor.
Risk and Exploitability
The CVSS score of 4.4 indicates a moderate severity, and the EPSS score is not available, providing no insight into current exploit likelihood. The vulnerability is not listed in the CISA KEV catalog. Attackers can potentially exploit the messaging interface of the components via a network connection, sending spoofed emails without needing elevated privileges on the targeted system.
OpenCVE Enrichment