Description
SOGo before 5.12.5 does not renew the OTP if a user disables/enables it, and has a too short length (only 12 digits instead of the 20 recommended).
Published: 2026-03-22
Score: 2 Low
EPSS: < 1% Very Low
KEV: No
Impact: Authentication bypass via re‑used OTP
Action: Apply Patch
AI Analysis

Impact

SOGo user accounts that disable and subsequently re‑enable OTP do not trigger an OTP renewal; the system continues to accept the previously issued token. Additionally, the token length is only twelve digits, well below the recommended twenty digits, making it easier for an adversary to guess or brute‑force the value. This flaw grants an attacker the ability to replay an old token and bypass authentication controls, potentially allowing unauthorized access to user mailboxes or other protected resources. The weakness corresponds to the CWE‑308, “Insufficient Validation of Security Parameters”.

Affected Systems

Alinto SOGo installations running a version earlier than 5.12.5 are affected. No other versions or products are listed as impacted.

Risk and Exploitability

The CVSS score of 2 indicates low overall severity, and the EPSS score is below 1 %, implying a very low probability of exploitation in the wild. The vulnerability is not included in the CISA Known Exploited Vulnerabilities catalog. The likely attack vector is inferred to be a local or remote attacker who can capture or guess a short OTP—such as through phishing, network interception or brute force such that they can replay the old token after a user disables and re‑enables OTP. Exploitation would require the attacker to obtain the OTP code or to observe its transmission, without requiring code execution or privilege escalation. Given the low score and exploit probability, the risk to most systems is limited, but the potential impact on confidentiality warrants mitigation.

Generated by OpenCVE AI on March 24, 2026 at 03:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official SOGo 5.12.5 update or later, which renews OTP tokens correctly and expands token length to the recommended twenty digits.

Generated by OpenCVE AI on March 24, 2026 at 03:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
Title Insufficient OTP Renewal and Length in SOGo Leading to Potential Credential Compromise

Tue, 24 Mar 2026 04:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:alinto:sogo:*:*:*:*:*:*:*:*

Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Alinto
Alinto sogo
Vendors & Products Alinto
Alinto sogo

Sun, 22 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Description SOGo before 5.12.5 does not renew the OTP if a user disables/enables it, and has a too short length (only 12 digits instead of the 20 recommended).
Weaknesses CWE-308
References
Metrics cvssV3_1

{'score': 2, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-23T15:53:19.737Z

Reserved: 2026-03-22T02:16:55.848Z

Link: CVE-2026-33550

cve-icon Vulnrichment

Updated: 2026-03-23T15:07:23.010Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-22T03:16:01.413

Modified: 2026-03-23T19:57:28.020

Link: CVE-2026-33550

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:46:44Z

Weaknesses