Description
Dovecot OTP authentication is vulnerable to replay attack under specific conditions. If auth cache is enabled, and username is altered in passdb, then OTP credentials can be cached so that same OTP reply is valid. An attacker able to observe an OTP exchange is able to log in as the user. If authentication happens over unsecure connection, switch to SCRAM protocol. Alternatively ensure the communcations are secured, and if possible switch to OAUTH2 or SCRAM. No publicly available exploits are known.
INFO
Published Date :
2026-03-27T08:10:18.821Z
Last Modified :
2026-03-27T19:39:50.286Z
Source :
OX
AFFECTED PRODUCTS
The following products are affected by CVE-2026-27855 vulnerability.
| Vendors | Products |
|---|---|
| Dovecot |
|
| Open-xchange |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-27855.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact