CVE-2026-27855Authentication Bypass by Capture-replay in Dovecot

Severity
6.8MEDIUMNVD
OSV5.3
EPSS
0.0%
top 87.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 27
Latest updateMar 31

Description

Dovecot OTP authentication is vulnerable to replay attack under specific conditions. If auth cache is enabled, and username is altered in passdb, then OTP credentials can be cached so that same OTP reply is valid. An attacker able to observe an OTP exchange is able to log in as the user. If authentication happens over unsecure connection, switch to SCRAM protocol. Alternatively ensure the communcations are secured, and if possible switch to OAUTH2 or SCRAM. No publicly available exploits are kno

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:NExploitability: 1.6 | Impact: 5.2

Affected Packages4 packages

debiandebian/dovecot< dovecot 1:2.3.19.1+dfsg1-2.1+deb12u2 (bookworm)
Debiandovecot/dovecot< 1:2.3.19.1+dfsg1-2.1+deb12u2+1
Ubuntudovecot/dovecot< 1:2.3.16+dfsg1-3ubuntu2.7+2

🔴Vulnerability Details

3
OSV
dovecot vulnerabilities2026-03-31
GHSA
GHSA-7923-h3mf-4442: Dovecot OTP authentication is vulnerable to replay attack under specific conditions2026-03-27
OSV
CVE-2026-27855: Dovecot OTP authentication is vulnerable to replay attack under specific conditions2026-03-27

📋Vendor Advisories

3
Ubuntu
Dovecot vulnerabilities2026-03-31
Red Hat
dovecot: Dovecot: Replay attack allows unauthorized login via observed One-Time Password (OTP) exchange2026-03-27
Debian
CVE-2026-27855: dovecot - Dovecot OTP authentication is vulnerable to replay attack under specific conditi...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-27855 Impact, Exploitability, and Mitigation Steps | Wiz