CVE-2024-24760: CWE-610: Externally Controlled Reference to a Resource in Another Sphere in mailcow mailcow-dockerized
mailcow is a dockerized email package, with multiple containers linked in one bridged network. A security vulnerability has been identified in mailcow affecting versions < 2024-01c. This vulnerability potentially allows attackers on the same subnet to connect to exposed ports of a Docker container, even when the port is bound to 127.0.0.1. The vulnerability has been addressed by implementing additional iptables/nftables rules. These rules drop packets for Docker containers on ports 3306, 6379, 8983, and 12345, where the input interface is not `br-mailcow` and the output interface is `br-mailcow`.
AI Analysis
Technical Summary
CVE-2024-24760 is a high-severity vulnerability affecting mailcow-dockerized versions prior to 2024-01c. mailcow is a popular dockerized email server suite that runs multiple containers interconnected via a bridged Docker network named br-mailcow. The vulnerability arises from insufficient network isolation controls within the Docker bridge network configuration. Specifically, attackers located on the same subnet as the mailcow deployment can bypass the intended localhost (127.0.0.1) binding restrictions on certain container ports. This allows them to connect to exposed service ports inside Docker containers that should only be accessible locally. The affected ports include 3306 (commonly MySQL), 6379 (Redis), 8983 (Solr), and 12345 (a custom or less common service port). The root cause is that Docker’s network filtering rules did not adequately block packets coming from interfaces other than br-mailcow targeting these ports, enabling lateral movement or unauthorized access within the subnet. The vendor addressed this by adding iptables/nftables rules that drop packets destined for these ports if the input interface is not br-mailcow but the output interface is br-mailcow, effectively enforcing network segmentation and preventing external subnet hosts from accessing these internal container services. The CVSS 3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and requiring only low privileges (PR:L) but no user interaction. No known exploits are reported in the wild yet. This vulnerability is classified under CWE-610, which relates to externally controlled references to resources in another sphere, highlighting the risk of unauthorized cross-network resource access due to improper isolation.
Potential Impact
For European organizations deploying mailcow-dockerized for email services, this vulnerability poses a significant risk of unauthorized access to critical backend services such as databases (MySQL), caching layers (Redis), and search engines (Solr) that are integral to mailcow’s operation. Exploitation could lead to data breaches exposing sensitive email data, user credentials, or internal configuration information, compromising confidentiality. Attackers could also manipulate or disrupt these services, impacting integrity and availability of the email platform, potentially causing service outages or data corruption. Given mailcow’s popularity among small to medium enterprises and hosting providers in Europe, the vulnerability could facilitate lateral movement within corporate or hosting provider networks, especially in environments where subnet segmentation is weak. This could escalate to broader compromise of organizational IT infrastructure. The lack of required user interaction and the ability to exploit remotely from the same subnet increases the threat level. Although no public exploits are known, the high CVSS score and the critical nature of the affected services warrant urgent attention to prevent potential targeted attacks or insider threats.
Mitigation Recommendations
European organizations should immediately upgrade mailcow-dockerized to version 2024-01c or later, where the vendor has implemented iptables/nftables rules to enforce strict network segmentation. Until upgrades are applied, administrators should manually verify and enforce firewall rules on the host to block inbound traffic to ports 3306, 6379, 8983, and 12345 from any interface other than br-mailcow. Network segmentation should be audited to ensure that only trusted hosts have access to the mailcow subnet. Monitoring network traffic for anomalous connections to these ports can help detect exploitation attempts. Additionally, organizations should review Docker daemon and container network configurations to ensure no unintended port exposures exist. Employing host-based intrusion detection systems (HIDS) and container security tools to monitor for suspicious activity targeting these services is recommended. Regular backups of mailcow data and configurations should be maintained to enable recovery in case of compromise. Finally, restricting administrative access to the mailcow environment and enforcing strong authentication and authorization controls will reduce the risk of privilege escalation and lateral movement.
Affected Countries
Germany, France, United Kingdom, Netherlands, Poland, Italy, Spain, Sweden
CVE-2024-24760: CWE-610: Externally Controlled Reference to a Resource in Another Sphere in mailcow mailcow-dockerized
Description
mailcow is a dockerized email package, with multiple containers linked in one bridged network. A security vulnerability has been identified in mailcow affecting versions < 2024-01c. This vulnerability potentially allows attackers on the same subnet to connect to exposed ports of a Docker container, even when the port is bound to 127.0.0.1. The vulnerability has been addressed by implementing additional iptables/nftables rules. These rules drop packets for Docker containers on ports 3306, 6379, 8983, and 12345, where the input interface is not `br-mailcow` and the output interface is `br-mailcow`.
AI-Powered Analysis
Technical Analysis
CVE-2024-24760 is a high-severity vulnerability affecting mailcow-dockerized versions prior to 2024-01c. mailcow is a popular dockerized email server suite that runs multiple containers interconnected via a bridged Docker network named br-mailcow. The vulnerability arises from insufficient network isolation controls within the Docker bridge network configuration. Specifically, attackers located on the same subnet as the mailcow deployment can bypass the intended localhost (127.0.0.1) binding restrictions on certain container ports. This allows them to connect to exposed service ports inside Docker containers that should only be accessible locally. The affected ports include 3306 (commonly MySQL), 6379 (Redis), 8983 (Solr), and 12345 (a custom or less common service port). The root cause is that Docker’s network filtering rules did not adequately block packets coming from interfaces other than br-mailcow targeting these ports, enabling lateral movement or unauthorized access within the subnet. The vendor addressed this by adding iptables/nftables rules that drop packets destined for these ports if the input interface is not br-mailcow but the output interface is br-mailcow, effectively enforcing network segmentation and preventing external subnet hosts from accessing these internal container services. The CVSS 3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and requiring only low privileges (PR:L) but no user interaction. No known exploits are reported in the wild yet. This vulnerability is classified under CWE-610, which relates to externally controlled references to resources in another sphere, highlighting the risk of unauthorized cross-network resource access due to improper isolation.
Potential Impact
For European organizations deploying mailcow-dockerized for email services, this vulnerability poses a significant risk of unauthorized access to critical backend services such as databases (MySQL), caching layers (Redis), and search engines (Solr) that are integral to mailcow’s operation. Exploitation could lead to data breaches exposing sensitive email data, user credentials, or internal configuration information, compromising confidentiality. Attackers could also manipulate or disrupt these services, impacting integrity and availability of the email platform, potentially causing service outages or data corruption. Given mailcow’s popularity among small to medium enterprises and hosting providers in Europe, the vulnerability could facilitate lateral movement within corporate or hosting provider networks, especially in environments where subnet segmentation is weak. This could escalate to broader compromise of organizational IT infrastructure. The lack of required user interaction and the ability to exploit remotely from the same subnet increases the threat level. Although no public exploits are known, the high CVSS score and the critical nature of the affected services warrant urgent attention to prevent potential targeted attacks or insider threats.
Mitigation Recommendations
European organizations should immediately upgrade mailcow-dockerized to version 2024-01c or later, where the vendor has implemented iptables/nftables rules to enforce strict network segmentation. Until upgrades are applied, administrators should manually verify and enforce firewall rules on the host to block inbound traffic to ports 3306, 6379, 8983, and 12345 from any interface other than br-mailcow. Network segmentation should be audited to ensure that only trusted hosts have access to the mailcow subnet. Monitoring network traffic for anomalous connections to these ports can help detect exploitation attempts. Additionally, organizations should review Docker daemon and container network configurations to ensure no unintended port exposures exist. Employing host-based intrusion detection systems (HIDS) and container security tools to monitor for suspicious activity targeting these services is recommended. Regular backups of mailcow data and configurations should be maintained to enable recovery in case of compromise. Finally, restricting administrative access to the mailcow environment and enforcing strong authentication and authorization controls will reduce the risk of privilege escalation and lateral movement.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2024-01-29T20:51:26.010Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aec2f6
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/4/2025, 6:28:41 PM
Last updated: 8/15/2025, 9:36:35 PM
Views: 17
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.