CVE-2026-27856Improper Authentication in Dovecot

Severity
7.4HIGHNVD
OSV5.3
EPSS
0.0%
top 88.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 27
Latest updateMar 31

Description

Doveadm credentials are verified using direct comparison which is susceptible to timing oracle attack. An attacker can use this to determine the configured credentials. Figuring out the credential will lead into full access to the affected component. Limit access to the doveadm http service port, install fixed version. No publicly available exploits are known.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:NExploitability: 2.2 | Impact: 5.2

Affected Packages4 packages

debiandebian/dovecot< dovecot 1:2.3.19.1+dfsg1-2.1+deb12u2 (bookworm)
Debiandovecot/dovecot< 1:2.3.19.1+dfsg1-2.1+deb12u2+1
Ubuntudovecot/dovecot< 1:2.3.16+dfsg1-3ubuntu2.7+2

🔴Vulnerability Details

3
OSV
dovecot vulnerabilities2026-03-31
GHSA
GHSA-mv3x-9fw3-qf38: Doveadm credentials are verified using direct comparison which is susceptible to timing oracle attack2026-03-27
OSV
CVE-2026-27856: Doveadm credentials are verified using direct comparison which is susceptible to timing oracle attack2026-03-27

📋Vendor Advisories

3
Ubuntu
Dovecot vulnerabilities2026-03-31
Red Hat
dovecot: Doveadm: Full access via timing oracle attack in credential verification2026-03-27
Debian
CVE-2026-27856: dovecot - Doveadm credentials are verified using direct comparison which is susceptible to...2026

🕵️Threat Intelligence

11
Wiz
CVE-2026-27858 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2026-0394 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2026-27856 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2026-27855 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2025-59032 Impact, Exploitability, and Mitigation Steps | Wiz