Platform
other
Component
seppmail-secure-email-gateway
Opgelost in
15.0.3
CVE-2026-29140 is a vulnerability affecting SEPPmail Secure Email Gateway versions 0 through 15.0.3. This flaw allows attackers to manipulate S/MIME signatures, enabling them to force the use of attacker-controlled certificates for future encryption. The vulnerability was publicly disclosed on April 2, 2026, and a patch is available in version 15.0.3.
The core impact of CVE-2026-29140 lies in the potential for man-in-the-middle (MITM) attacks and compromised communication confidentiality. An attacker can craft malicious S/MIME signatures containing certificates they control. When SEPPmail processes these signatures, it may inadvertently add these attacker-controlled certificates to its trusted certificate store. Subsequently, any encrypted communication relying on S/MIME will use these compromised certificates, allowing the attacker to decrypt and potentially modify messages. This could lead to data breaches, phishing attacks, and other malicious activities, particularly if SEPPmail is used to handle sensitive email communications.
CVE-2026-29140 was publicly disclosed on April 2, 2026. There is currently no indication of active exploitation or a KEV listing. Public proof-of-concept code is not yet available, but the vulnerability's nature suggests it could be relatively easy to exploit once a suitable PoC is developed. Organizations should prioritize patching to prevent potential future exploitation.
Organizations heavily reliant on SEPPmail Secure Email Gateway for secure email communication, particularly those handling sensitive data like financial records or personal information, are at significant risk. Environments with weak certificate management practices or a history of email-borne attacks are also particularly vulnerable.
disclosure
Exploit Status
EPSS
0.03% (9% percentiel)
CISA SSVC
The primary mitigation for CVE-2026-29140 is to immediately upgrade SEPPmail Secure Email Gateway to version 15.0.3 or later. If upgrading is not immediately feasible, consider implementing strict input validation on S/MIME signatures to prevent the inclusion of untrusted certificates. Review and audit existing S/MIME configurations to identify and remove any suspicious or unauthorized certificates. Monitor email traffic for unusual certificate usage patterns that could indicate exploitation. While a WAF is unlikely to directly address this vulnerability, it can help detect and block malicious S/MIME signatures based on known patterns.
Werk SEPPmail Secure Email Gateway bij naar versie 15.0.3 of hoger. Dit voorkomt dat een aanvaller de certificaten controleert die worden gebruikt voor toekomstige encryptie naar een slachtoffer.
Kwetsbaarheidsanalyses en kritieke waarschuwingen direct in uw inbox.
CVE-2026-29140 is a vulnerability in SEPPmail Secure Email Gateway versions 0-15.0.3 that allows attackers to inject malicious certificates into S/MIME signatures, potentially compromising future encrypted communications.
If you are using SEPPmail Secure Email Gateway versions 0 through 15.0.3, you are potentially affected by this vulnerability. Upgrade to version 15.0.3 to mitigate the risk.
The recommended fix is to upgrade SEPPmail Secure Email Gateway to version 15.0.3 or later. Consider input validation as a temporary workaround if upgrading is not immediately possible.
As of the current disclosure date, there is no confirmed evidence of active exploitation of CVE-2026-29140.
Please refer to the official SEPPmail security advisory for detailed information and updates regarding CVE-2026-29140. Check the SEPPmail website for the latest announcements.
Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.