Description
SEPPmail Secure Email Gateway before version 15.0.3 does not properly authenticate the inner message of S/MIME-encrypted MIME entities, allowing an attacker to control trusted headers.
Published: 2026-04-02
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Impersonation via trusted header manipulation
Action: Patch
AI Analysis

Impact

SEPPmail Secure Email Gateway fails to validate the inner message of S/MIME‑encrypted MIME entities, allowing an attacker to set or alter trusted email headers. This can lead to forged message origins and makes recipients believe the mail comes from a legitimate sender. The flaw is an instance of improper input validation and is classified as CWE‑20. The vulnerability can compromise data integrity and enable phishing, spoofing, or other social‑engineering attacks.

Affected Systems

All installations of SEPPmail Secure Email Gateway assigned to the vendor SEPPmail and running a version earlier than 15.0.3 are affected. Any instance that processes S/MIME messages is potentially vulnerable, regardless of environment or configuration.

Risk and Exploitability

The CVSS score of 7.8 reflects a high severity, indicating that successful exploitation would expose the system to significant impact on confidentiality and integrity. Although EPSS data is unavailable and the vulnerability is not listed in the KEV catalog, the lack of those metrics does not lower the real‑world risk. Based on the description, the likely attack vector involves the delivery of a crafted S/MIME email to the gateway; an attacker must control or inject messages into the email flow to an affected system. Once triggered, the attacker can alter trusted headers to impersonate a sender or bypass authentication checks, making the risk considerable for organizations relying on S/MIME for secure communications.

Generated by OpenCVE AI on April 2, 2026 at 10:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the SEPPmail Secure Email Gateway version currently in use
  • Back up existing configurations and gateway data
  • Apply the official security update to version 15.0.3 or later
  • Confirm that S/MIME messages are now processed with proper header authentication

Generated by OpenCVE AI on April 2, 2026 at 10:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
Description SEPPmail Secure Email Gateway before version 15.0.3 does not properly authenticate the inner message of S/MIME-encrypted MIME entities, allowing an attacker to control trusted headers.
Title S/MIME Decryption Impersonation
First Time appeared Seppmail
Seppmail seppmail Secure Email Gateway
Weaknesses CWE-20
CPEs cpe:2.3:a:seppmail:seppmail_secure_email_gateway:*:*:*:*:*:*:*:*
Vendors & Products Seppmail
Seppmail seppmail Secure Email Gateway
References
Metrics cvssV4_0

{'score': 7.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:H/SA:N'}


Subscriptions

Seppmail Seppmail Secure Email Gateway
cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC.ch

Published:

Updated: 2026-04-02T13:34:31.668Z

Reserved: 2026-03-04T09:08:07.342Z

Link: CVE-2026-29143

cve-icon Vulnrichment

Updated: 2026-04-02T13:34:26.815Z

cve-icon NVD

Status : Received

Published: 2026-04-02T09:16:23.123

Modified: 2026-04-02T09:16:23.123

Link: CVE-2026-29143

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:21:43Z

Weaknesses