CVE-2023-38686

CVSS 3.1 Score 5.3 of 10 (medium)

Details

Published Aug 4, 2023
Updated: Aug 10, 2023
CWE ID 295

Summary

CVE-2023-38686: Sydent, an identity server for Matrix communications protocol, suffered from a vulnerability in versions prior to 2.5.6. The issue involved unverified TLS certificates for SMTP servers during email transmission, leaving Sydent's emails susceptible to man-in-the-middle (MITM) attacks. Attackers with network privileges could intercept room invitations and address confirmation emails. The vulnerability has been addressed in Sydent 2.5.6. To apply the patch, ensure trust in the certificate of the connecting server. Self-signed certificates require copying to the operating system's trust store, while a workaround involves failing email transmission by configuring the SMTP server to a non-routable address.

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Affected Vendors

  • El Paso Multi-Agency Tactical Response Information eXchange