Description
SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to cause attacker-controlled certificates to be used for future encryption to a victim by adding the certificates to S/MIME signatures.
Published: 2026-04-02
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Adversary-controlled certificates used for future email encryption
Action: Immediate Patch
AI Analysis

Impact

SEPPmail Secure Email Gateway versions before 15.0.3 contain a flaw that lets an attacker embed a forged certificate into an S/MIME signature. When the gateway subsequently encrypts communications with a victim, it selects and uses the attacker‑controlled certificate. This capability can allow the attacker to decrypt, alter, or fabricate mail sent by the gateway, effectively turning the encryption mechanism into a vector for data disclosure and spoofing. The weakness follows the certificate‑validation error described in CWE‑295.

Affected Systems

All deployments of SEPPmail Secure Email Gateway running any version earlier than 15.0.3 are affected. Because the vulnerability is tied to the version number, administrators should verify their current release and ensure it meets or exceeds the 15.0.3 baseline. No specific patch level is listed beyond the fixed version; any release prior to 15.0.3 remains vulnerable.

Risk and Exploitability

The CVSS v3.1 score of 7.7 indicates a high severity that can compromise confidentiality and integrity. EPSS data is unavailable, but the lack of a CISA KEV listing suggests no publicly known exploit at the time of disclosure. The attack can be performed remotely by any actor able to send S/MIME‑signed messages to the affected gateway, and it does not require elevated privileges. The likely attack vector is inferred to be remote via crafted S/MIME signatures, enabling the attacker to influence the encryption process for future mail traffic.

Generated by OpenCVE AI on April 2, 2026 at 09:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SEPPmail Secure Email Gateway to version 15.0.3 or newer, following the vendor’s release notes.
  • If an immediate upgrade is not possible, configure mail‑gateway rules to reject S/MIME signatures that contain certificates not issued by a trusted CA or that are not listed in the gateway’s client‑store.
  • Verify the upgrade by sending test encrypted mail and checking that the gateway uses certificates from the approved trust store.
  • Monitor mail logs for abnormal certificate usage and keep the system patched as new guidance becomes available.

Generated by OpenCVE AI on April 2, 2026 at 09:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to cause attacker-controlled certificates to be used for future encryption to a victim by adding the certificates to S/MIME signatures.
Title S/MIME Signature Additional Certificate
First Time appeared Seppmail
Seppmail seppmail Secure Email Gateway
Weaknesses CWE-295
CPEs cpe:2.3:a:seppmail:seppmail_secure_email_gateway:*:*:*:*:*:*:*:*
Vendors & Products Seppmail
Seppmail seppmail Secure Email Gateway
References
Metrics cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:H/SI:N/SA:N'}


Subscriptions

Seppmail Seppmail Secure Email Gateway
cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC.ch

Published:

Updated: 2026-04-02T14:48:53.216Z

Reserved: 2026-03-04T09:08:07.342Z

Link: CVE-2026-29140

cve-icon Vulnrichment

Updated: 2026-04-02T14:48:47.837Z

cve-icon NVD

Status : Received

Published: 2026-04-02T09:16:22.623

Modified: 2026-04-02T09:16:22.623

Link: CVE-2026-29140

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:22:09Z

Weaknesses