Skip to main content

CVE-2024-50624: n/a in n/a

Medium
VulnerabilityCVE-2024-50624cvecve-2024-50624
Published: Sun Oct 27 2024 (10/27/2024, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

ispdbservice.cpp in KDE Kmail before 6.2.0 allows man-in-the-middle attackers to trigger use of an attacker-controlled mail server because cleartext HTTP is used for a URL such as http://autoconfig.example.com or http://example.com/.well-known/autoconfig for retrieving the configuration. This is related to kmail-account-wizard.

AI-Powered Analysis

AILast updated: 07/08/2025, 13:40:14 UTC

Technical Analysis

CVE-2024-50624 is a medium-severity vulnerability affecting KDE KMail versions prior to 6.2.0. The issue resides in the ispdbservice.cpp component, specifically related to the kmail-account-wizard functionality. The vulnerability arises because KMail retrieves configuration data over cleartext HTTP URLs such as http://autoconfig.example.com or http://example.com/.well-known/autoconfig. This lack of encryption allows a man-in-the-middle (MitM) attacker to intercept and manipulate the configuration retrieval process. By doing so, the attacker can cause KMail to use a malicious mail server controlled by the attacker. This compromises the confidentiality of email communications by redirecting mail traffic through an attacker-controlled server, potentially exposing sensitive information. The vulnerability is classified under CWE-319 (Cleartext Transmission of Sensitive Information). According to the CVSS v3.1 vector (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N), the attack requires adjacent network access (e.g., same Wi-Fi network), has high attack complexity, no privileges or user interaction needed, and impacts confidentiality highly, with limited integrity impact and no availability impact. No known exploits are reported in the wild yet, and no patches are linked at the time of publication.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially in environments where users connect to untrusted or public networks, such as cafes, airports, or shared office spaces. The ability for an attacker to redirect email configuration to a malicious server can lead to interception of sensitive corporate communications, including confidential business information, personal data, or credentials. This can facilitate further attacks such as phishing, espionage, or data leakage. Organizations relying on KDE KMail for email, particularly in sectors with strict data protection regulations like GDPR, face compliance risks if such interception leads to data breaches. The medium CVSS score reflects the requirement for network proximity and high attack complexity, but the high confidentiality impact means that successful exploitation could have serious consequences for privacy and data security.

Mitigation Recommendations

European organizations should prioritize upgrading KDE KMail to version 6.2.0 or later, where this vulnerability is addressed. Until patches are available or applied, users should avoid connecting to untrusted or public networks when configuring email accounts with KMail. Network administrators can implement network-level protections such as enforcing HTTPS or DNS-based protections (e.g., DNS over HTTPS or DNSSEC) to prevent interception of autoconfig URLs. Additionally, organizations should consider deploying VPN solutions to secure user network traffic, reducing the risk of MitM attacks. Monitoring network traffic for suspicious redirects or unusual mail server configurations can help detect exploitation attempts. Finally, educating users about the risks of configuring email over insecure networks and encouraging the use of secure protocols is essential.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683aba2c182aa0cae2d7774d

Added to database: 5/31/2025, 8:13:32 AM

Last enriched: 7/8/2025, 1:40:14 PM

Last updated: 7/31/2025, 9:06:11 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats