CVE-2021-26911

7.4 HIGH

📋 TL;DR

CVE-2021-26911 is a missing SSL certificate validation vulnerability in Canary Mail's IMAP implementation when using STARTTLS mode. This allows man-in-the-middle attackers to intercept and potentially modify email communications between the Canary Mail client and IMAP servers. Users of Canary Mail versions before 3.22 on any platform are affected.

💻 Affected Systems

Products:
  • Canary Mail
Versions: All versions before 3.22
Operating Systems: iOS, macOS, Android, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects IMAP connections using STARTTLS mode. SSL/TLS connections without STARTTLS are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers can perform full man-in-the-middle attacks, intercepting all email communications including login credentials, reading all email content, and potentially injecting malicious emails or modifying legitimate communications.

🟠

Likely Case

Targeted attacks in insecure networks (public WiFi, compromised routers) leading to email interception and credential theft.

🟢

If Mitigated

Limited impact if using VPNs, trusted networks, or alternative secure email protocols with proper certificate validation.

🌐 Internet-Facing: HIGH - Email clients frequently connect to external IMAP servers over the internet, exposing users to network-based attacks.
🏢 Internal Only: MEDIUM - Internal network attacks still possible if internal network is compromised or attacker has internal access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Standard SSL stripping/man-in-the-middle techniques can exploit this vulnerability. Public proof-of-concept exists in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.22 and later

Vendor Advisory: https://census-labs.com/news/2021/02/17/canary-mail-app-missing-certificate-validation-check-on-imap-starttls/

Restart Required: Yes

Instructions:

1. Open Canary Mail app store (App Store for iOS/macOS, Google Play for Android, Microsoft Store for Windows). 2. Check for updates. 3. Install version 3.22 or later. 4. Restart the application.

🔧 Temporary Workarounds

Use SSL/TLS instead of STARTTLS

all

Configure IMAP connections to use SSL/TLS encryption directly instead of STARTTLS upgrade

Use alternative email protocols

all

Switch to Exchange ActiveSync or other supported protocols that don't use IMAP STARTTLS

🧯 If You Can't Patch

  • Avoid using Canary Mail on untrusted networks (public WiFi, hotel networks)
  • Use VPN when connecting to email services to encrypt all network traffic

🔍 How to Verify

Check if Vulnerable:

Check Canary Mail version in app settings. If version is below 3.22 and you use IMAP with STARTTLS, you are vulnerable.

Check Version:

Open Canary Mail → Settings/Preferences → About → Check version number

Verify Fix Applied:

Verify Canary Mail version is 3.22 or higher in app settings. Test IMAP STARTTLS connections to confirm certificate validation is working.

📡 Detection & Monitoring

Log Indicators:

  • Failed SSL certificate validation warnings that should appear but don't
  • Unexpected certificate changes in IMAP connections

Network Indicators:

  • Unencrypted IMAP traffic after STARTTLS negotiation
  • SSL certificate validation failures that client ignores

SIEM Query:

network.protocol:imap AND (ssl.validation:failed OR ssl.certificate:invalid) AND NOT action:blocked

🔗 References

📤 Share & Export