FKIE_CVE-2024-10635

Vulnerability from fkie_nvd - Published: 2025-04-28 21:15 - Updated: 2025-10-06 21:15
Summary
Enterprise Protection contains an improper input validation vulnerability in attachment defense that allows an unauthenticated remote attacker to bypass attachment scanning security policy by sending a malicious S/MIME attachment with an opaque signature. When opened by a recipient in a downstream email client, the malicious attachment could cause partial loss of integrity and confidentiality to their system.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:proofpoint:enterprise_protection:8.18.6:*:*:*:-:*:*:*",
              "matchCriteriaId": "79AADBAC-33A4-404F-828D-6758C564A124",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proofpoint:enterprise_protection:8.20.6:*:*:*:-:*:*:*",
              "matchCriteriaId": "CDD35655-46C3-487C-ADC7-562A9EA3DBB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proofpoint:enterprise_protection:8.21.0:*:*:*:-:*:*:*",
              "matchCriteriaId": "702F4569-3720-4A2C-98FC-FDE52C5574D5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Enterprise Protection contains an improper input validation vulnerability in attachment defense that allows an unauthenticated remote attacker to bypass attachment scanning security policy by sending a malicious S/MIME attachment with an opaque signature. When opened by a recipient in a downstream email client, the malicious attachment could cause partial loss of integrity and confidentiality to their system."
    },
    {
      "lang": "es",
      "value": "Enterprise Protection contiene una vulnerabilidad de validaci\u00f3n de entrada incorrecta en la defensa contra archivos adjuntos que permite a un atacante remoto no autenticado eludir la pol\u00edtica de seguridad de escaneo de archivos adjuntos mediante el env\u00edo de un archivo adjunto S/MIME malicioso con una firma opaca. Al ser abierto por un destinatario en un cliente de correo electr\u00f3nico secundario, el archivo adjunto malicioso podr\u00eda causar una p\u00e9rdida parcial de la integridad y confidencialidad de su sistema."
    }
  ],
  "id": "CVE-2024-10635",
  "lastModified": "2025-10-06T21:15:32.307",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "security@proofpoint.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-04-28T21:15:56.427",
  "references": [
    {
      "source": "security@proofpoint.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2025-0002"
    }
  ],
  "sourceIdentifier": "security@proofpoint.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-754"
        }
      ],
      "source": "security@proofpoint.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…