CVE-2024-23655
Homebrew vulnerability analysis and mitigation

Overview

A vulnerability in Tutanota (CVE-2024-23655) allows an attacker to render the application unusable by sending a manipulated email, preventing users from accessing their received emails. The vulnerability was discovered and disclosed on January 25, 2024, affecting versions >=3.118.12 and < 3.119.10. The issue has been patched in version 3.119.10 (GitHub Advisory).

Technical details

The vulnerability occurs when an attacker sends an email encrypted with a different public key than the recipient's. This can be accomplished by intercepting the server response and replacing the recipient's public key with another. When the victim receives the manipulated email, it triggers an error message and puts the application in an unusable state. The vulnerability has been assigned a CVSS score of 7.5 (High), with attack vector being Network, attack complexity Low, requiring no privileges or user interaction, and primarily affecting availability (GitHub Advisory).

Impact

When exploited, the vulnerability prevents users from displaying or reading emails in their inbox. After receiving the manipulated email, users may experience temporary inability to display new mails, move emails, or change certain settings. The audit log is no longer updated, which affects important security actions such as two-factor authentication changes. The impact affects both the mobile app and web application, leaving users with no way to access their received emails (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in Tutanota version 3.119.10. Users are advised to upgrade to this version to protect against the vulnerability (GitHub Release).

Additional resources


SourceThis report was generated using AI

Related Homebrew vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-21428HIGH7.7
  • HomebrewHomebrew
  • cpp-httplib
NoYesJan 01, 2026
CVE-2025-68120MEDIUM5.4
  • NixOSNixOS
  • go
NoYesDec 30, 2025
CVE-2025-69413MEDIUM5.3
  • NixOSNixOS
  • code.gitea.io/gitea
NoYesJan 01, 2026
CVE-2025-15412MEDIUM4.8
  • NixOSNixOS
  • wabt
NoNoJan 01, 2026
CVE-2025-15411MEDIUM4.8
  • NixOSNixOS
  • wabt
NoNoJan 01, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management