CVE-2026-27444 PUBLISHED

Header Email Address Parsing

Assigner: NCSC.ch
Reserved: 19.02.2026 Published: 04.03.2026 Updated: 04.03.2026

SEPPmail Secure Email Gateway before version 15.0.1 incorrectly interprets email addresses in the email headers, causing an interpretation conflict with other mail infrastructure that allows an attacker to fake the source of the email or decrypt it.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:H/SA:N
CVSS Score: 7.8

Product Status

Vendor SEPPmail
Product Secure Email Gateway
Versions Default: unaffected
  • affected from 0 to 15.0.1 (excl.)

Credits

  • Andris Suter-Dörig finder
  • Matteo Scarlata coordinator
  • Kenny Paterson coordinator

References

Problem Types

  • CWE-436 Interpretation Conflict CWE

Impacts

  • CAPEC-194 Fake the Source of Data