
Cloud Vulnerability DB
A community-led vulnerabilities database
Tuta (formerly Tutanota), an encrypted email service, was found to contain a vulnerability in versions prior to 119.10 where external images in HTML emails could be loaded automatically despite disabled settings. This vulnerability was discovered in January 2024 and assigned CVE-2024-23330 (GitHub Advisory).
The vulnerability stems from a bypass of the 'Automatic Reloading of Images' function. When this feature is disabled, certain embedded images are still loaded automatically, including over unencrypted HTTP connections, and redirections are followed. The issue has been assigned a CVSS v3.1 base score of 5.3 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N. The vulnerability is classified as Server-Side Request Forgery (SSRF) under CWE-918 (NVD).
The vulnerability exposes users to privacy risks as it allows email senders to determine when an email is read, collect information about the recipient's device, and obtain the user's IP address. This occurs without the user's explicit consent or awareness, contradicting the expected behavior of the email client's security settings (GitHub Advisory).
The vulnerability has been patched in version 119.10 of the Tuta email service. Users should update to this version or later to protect against this security issue (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."