Cyber Posture

CVE-2026-29139

Critical

Published: 02 April 2026

Published
02 April 2026
Modified
16 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0006 18.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-29139 is a critical-severity Authentication Bypass Using an Alternate Path or Channel (CWE-288) vulnerability in Seppmail Secure Email Gateway. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and AC-2 (Account Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the vulnerability by requiring identification, reporting, and timely patching of security flaws like the GINA account initialization bypass fixed in SEPPmail 15.0.3.

prevent

Requires identity verification and secure procedures for initial authenticator distribution and password resets, preventing unauthorized abuse of account initialization features.

preventdetect

Mandates secure account management including password changes, notifications of account modifications, and review of unused accounts to limit and detect unauthorized takeovers.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1078 Valid Accounts Stealth
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

Auth bypass in public-facing SEPPmail gateway directly enables remote exploitation (T1190) leading to account takeover and subsequent use of valid accounts (T1078).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

SEPPmail Secure Email Gateway before version 15.0.3 allows account takeover by abusing GINA account initialization to reset a victim account password.

Deeper analysisAI

CVE-2026-29139 is a critical authentication bypass vulnerability affecting SEPPmail Secure Email Gateway versions prior to 15.0.3. The flaw allows attackers to achieve account takeover by abusing the GINA account initialization feature to reset a victim account's password. It has been assigned CWE-288 (Authentication Bypass Using an Alternate Path or Channel) and a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its network accessibility, low attack complexity, and lack of prerequisites.

An unauthenticated attacker with network access to the affected SEPPmail instance can exploit this vulnerability remotely without user interaction. By leveraging the GINA account initialization process, the attacker can reset passwords for legitimate user accounts, enabling full account takeover. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, potentially allowing the attacker to impersonate users, access sensitive email data, or perform administrative actions within the gateway.

The official SEPPmail release notes for version 15.0 document this vulnerability disclosure and confirm that upgrading to SEPPmail Secure Email Gateway 15.0.3 or later resolves the issue. Security practitioners should prioritize patching affected systems, as detailed in the advisory at https://downloads.seppmail.com/extrelnotes/150/ERN15.0.html#seppmail-vulnerability-disclosure-1503.

Details

CWE(s)

Affected Products

seppmail
secure email gateway
≤ 15.0.3

CVEs Like This One

CVE-2026-29143Same product: Seppmail Secure Email Gateway
CVE-2026-29135Same product: Seppmail Secure Email Gateway
CVE-2026-29134Same product: Seppmail Secure Email Gateway
CVE-2026-29132Same product: Seppmail Secure Email Gateway
CVE-2026-29133Same product: Seppmail Secure Email Gateway
CVE-2026-29131Same product: Seppmail Secure Email Gateway
CVE-2026-29138Same product: Seppmail Secure Email Gateway
CVE-2026-2743Same vendor: Seppmail
CVE-2025-7444Shared CWE-288
CVE-2026-27389Shared CWE-288

References