Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-27856: Dovecot doveadm Timing Oracle Enables Credential Recovery
CVE-2026-27856: Dovecot doveadm Timing Oracle Enables Credential Recovery
SECURITYHIGHCVE-2026-27856

CVE-2026-27856: Dovecot doveadm Timing Oracle Enables Credential Recovery

A timing oracle vulnerability in Dovecot's doveadm HTTP service allows unauthenticated remote attackers to recover configured credentials through response-time analysis, leading to full administrative access.

Dylan H.

Security Team

March 28, 2026
6 min read

Affected Products

  • Dovecot IMAP server (doveadm HTTP service)
  • All versions using direct credential comparison in doveadm

CVE-2026-27856: Dovecot doveadm Timing Oracle Attack

A timing side-channel vulnerability tracked as CVE-2026-27856 has been disclosed in Dovecot's doveadm HTTP service. The flaw arises from a direct string comparison used to verify doveadm credentials, which is susceptible to a timing oracle attack. By measuring response latency differences, a remote attacker can methodically determine the configured credentials — ultimately achieving full access to the doveadm HTTP API.

The vulnerability was published on March 27, 2026, and assigned a CVSS v3.1 score of 7.4 (High). Dovecot recommends restricting access to the doveadm HTTP service port as an immediate mitigation until a patch is available.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-27856
CVSS Score7.4 (High)
CWE ClassificationCWE-208 — Observable Timing Discrepancy
Affected Componentdoveadm HTTP service credential verification
Attack VectorNetwork
Privileges RequiredNone
User InteractionNone
Primary ImpactCredential recovery → full doveadm API access
PublishedMarch 27, 2026

Affected Software

The vulnerability affects the doveadm HTTP service component of Dovecot. Dovecot is the world's most widely deployed IMAP and POP3 server, commonly found in enterprise mail infrastructure, hosting providers, and ISP environments. The doveadm HTTP API provides administrative control over mailboxes, users, and server operations — making credential exposure a high-severity incident.

Deployments that expose the doveadm HTTP service over a network interface are most at risk. Installations where the doveadm port is bound only to localhost or protected behind a firewall have a significantly reduced attack surface.


Technical Details

Root Cause: Non-Constant-Time Comparison

The doveadm HTTP service authenticates incoming requests by comparing a provided credential string against the configured secret. The comparison is implemented as a direct equality check rather than a constant-time comparison function.

In a direct (non-constant-time) string comparison, the operation returns as soon as a byte mismatch is detected. This means:

  • A guess that matches the first N bytes of the correct credential takes longer to reject than one that fails immediately at byte 0
  • By systematically varying credential bytes and measuring response times, an attacker can determine correct bytes one at a time

This class of vulnerability is known as a timing oracle or timing side-channel attack (CWE-208: Observable Timing Discrepancy).

Attack Methodology

1. Attacker sends credential guess "A..." to doveadm HTTP endpoint
2. Measures response latency: T_wrong_first_byte (fast rejection)
3. Tries "B...", "C...", ... until one guess produces T_correct_first_byte (slower)
4. Correct first byte identified — repeat for each subsequent byte
5. Full credential string recovered byte-by-byte
6. Attacker authenticates with recovered credential
7. Full access to doveadm HTTP API achieved

The number of requests required scales linearly with credential length and character set size, making this a practical attack given sufficient network access and stable latency conditions. In low-jitter network environments such as local networks or co-located servers, the timing differences are more reliably measurable.

Impact of Full doveadm Access

The doveadm HTTP API provides administrative control over the Dovecot server, including:

  • Mailbox management: List, read, export, delete, and move mailboxes across all users
  • User operations: Create and remove user accounts, modify quotas
  • Search and export: Execute mail searches across the entire server
  • Purge and cleanup: Delete messages and expunge mailboxes

An attacker with recovered credentials can read any user's email, exfiltrate mail data in bulk, or modify mailbox state — representing a complete confidentiality and integrity compromise of the mail store.


Impact Assessment

AreaDescription
ConfidentialityFull mail content of all users readable via doveadm API
IntegrityAttacker can delete, move, or modify messages in any mailbox
Network ExposureAttack requires network access to the doveadm HTTP port
Timing StabilityLow-jitter, co-located, or LAN environments are most vulnerable
ISP / Hosting RiskMulti-tenant mail servers expose all tenants' mail if doveadm is reachable

Remediation

Immediate Mitigation: Restrict Network Access

Dovecot explicitly recommends limiting access to the doveadm HTTP service port as the primary mitigation until a patch is available:

# Identify the doveadm HTTP listener port (default: 8080 or custom)
doveconf | grep doveadm_port
 
# Block external access via firewall (ufw example)
ufw deny <doveadm_port>/tcp
 
# Allow only trusted management hosts
ufw allow from <trusted_management_ip> to any port <doveadm_port> proto tcp

For environments using firewalld:

# Remove doveadm port from public zone
firewall-cmd --zone=public --remove-port=<doveadm_port>/tcp --permanent
firewall-cmd --reload
 
# Optionally restrict to a management zone
firewall-cmd --zone=management --add-port=<doveadm_port>/tcp --permanent

Patch

Monitor the official Dovecot security page for a patch release. Once available, apply promptly.

Additional Hardening

  1. Rotate the doveadm secret after patching — credentials may have been compromised
  2. Review doveadm access logs for unusual credential-probing patterns (many rapid authentication failures from a single source)
  3. Prefer Unix socket for local doveadm access where remote administration is not required — socket-based connections eliminate the network timing attack surface entirely
  4. Use network segmentation to isolate the doveadm port behind a management-only interface or VPN

Detection

Timing oracle attacks are difficult to detect from application logs alone since each individual request appears as a failed authentication. High-volume authentication failures from a single source are an indicator of credential probing. Look for:

  • Repeated failed authentication attempts against the doveadm HTTP endpoint from a single IP
  • Unusual request volume on the doveadm port compared to baseline
  • Scripted timing patterns — requests sent at regular intervals characteristic of automated probing

Key Takeaways

  1. CVE-2026-27856 is a timing oracle in Dovecot's doveadm HTTP service credential verification — attackers can recover credentials by measuring response time differences
  2. A CVSS 7.4 High severity rating reflects the network-accessible attack vector and potential for full administrative access
  3. Full doveadm access grants read/write/delete capability over all mail on the server, making this a high-impact breach if exploited
  4. The recommended immediate mitigation is firewall restriction of the doveadm HTTP port to trusted management hosts only
  5. Environments where doveadm is exposed to untrusted networks — including internet-facing deployments — should treat this as urgent

Sources

  • CVE-2026-27856 — NIST NVD
  • Dovecot — Official Security Advisories
#CVE-2026-27856#Dovecot#Timing Oracle#Credential Exposure#CWE-208#IMAP#Vulnerability

Related Articles

CVE-2025-43510: Apple Multiple Products Improper Locking Vulnerability

Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain an improper locking vulnerability allowing a malicious app to cause unexpected changes in...

6 min read

CVE-2025-54068: Laravel Livewire Code Injection Vulnerability

A critical code injection vulnerability in Laravel Livewire v3 allows unauthenticated remote attackers to execute arbitrary commands. Over 130,000...

7 min read

CVE-2026-22172: OpenClaw Critical Authorization Bypass via WebSocket Scope Elevation

A critical CVSS 9.9 authorization bypass in OpenClaw allows authenticated users to self-declare elevated scopes over WebSocket connections without...

6 min read
Back to all Security Alerts