CVE-2023-23566
CRITICALAxigen Mail Server - Incorrect Default Permissions
Title source: ruleDescription
A 2-Step Verification problem in Axigen 10.3.3.52 allows an attacker to access a mailbox by bypassing 2-Step Verification when they try to add an account to any third-party webmail service (or add an account to Outlook or Gmail, etc.) with IMAP or POP3 without any verification code.
References (4)
Core 4
Core References
Third Party Advisory
https://github.com/umz-cert/vulnerabilities/issues/1
Third Party Advisory
https://github.com/umz-cert/vulnerabilitys/blob/patch-1/Axigen%20Mail%20Server%2010.3.3.52%202-Step%20verification
Technical Description, Vendor Advisory
https://www.axigen.com/documentation/2-step-verification-two-factor-authentication-for-webmail-p69140479
Vendor Advisory
https://www.axigen.com/mail-server/download/
Scores
CVSS v3
9.8
EPSS
0.0070
EPSS Percentile
72.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Details
CWE
CWE-276
Status
published
Products (1)
axigen/axigen_mail_server
10.3.3.52
Published
Jan 13, 2023
Tracked Since
Feb 18, 2026