Enterprise Protection contains an improper input validation vulnerability in attachment defense that allows an unauthenticated remote attacker to bypass attachment scanning security policy by sending a malicious S/MIME attachment with an opaque signature. When opened by a recipient in a downstream email client, the malicious attachment could cause partial loss of integrity and confidentiality to their system.
History

Mon, 28 Apr 2025 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 28 Apr 2025 20:45:00 +0000

Type Values Removed Values Added
Description Enterprise Protection contains an improper input validation vulnerability in attachment defense that allows an unauthenticated remote attacker to bypass attachment scanning security policy by sending a malicious S/MIME attachment with an opaque signature. When opened by a recipient in a downstream email client, the malicious attachment could cause partial loss of integrity and confidentiality to their system.
Title Enterprise Protection S/MIME Opaque Signature Attachment Scanning Bypass
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Proofpoint

Published: 2025-04-28T20:36:43.320Z

Updated: 2025-04-28T22:28:39.716Z

Reserved: 2024-10-31T18:23:56.308Z

Link: CVE-2024-10635

cve-icon Vulnrichment

Updated: 2025-04-28T22:28:35.658Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-28T21:15:56.427

Modified: 2025-04-29T13:52:10.697

Link: CVE-2024-10635

cve-icon Redhat

No data.