Enterprise Protection contains an improper input validation vulnerability in attachment defense that allows an unauthenticated remote attacker to bypass attachment scanning security policy by sending a malicious S/MIME attachment with an opaque signature. When opened by a recipient in a downstream email client, the malicious attachment could cause partial loss of integrity and confidentiality to their system.
References
Link | Resource |
---|---|
https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2025-0002 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
10 May 2025, 00:56
Type | Values Removed | Values Added |
---|---|---|
First Time |
Proofpoint enterprise Protection
Proofpoint |
|
CWE | NVD-CWE-noinfo | |
References | () https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2025-0002 - Vendor Advisory | |
CPE | cpe:2.3:a:proofpoint:enterprise_protection:8.18.6:*:*:*:-:*:*:* cpe:2.3:a:proofpoint:enterprise_protection:8.21.0:*:*:*:-:*:*:* cpe:2.3:a:proofpoint:enterprise_protection:8.20.6:*:*:*:-:*:*:* |
29 Apr 2025, 13:52
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
28 Apr 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-28 21:15
Updated : 2025-05-10 00:56
NVD link : CVE-2024-10635
Mitre link : CVE-2024-10635
CVE.ORG link : CVE-2024-10635
JSON object : View
Products Affected
proofpoint
- enterprise_protection
CWE