Response to CVE-2019-20364

Response to CVE-2019-20634

Advisory ID: PFPT-SN-2020-0001

Summary

On 3/30/2020 NIST published CVE-2019-20634 stating that:
"By collecting scores from Proofpoint email headers, it is possible to build a copy-cat Machine Learning Classification model and extract insights from this model. The insights gathered allow an attacker to craft emails that receive preferable scores, with a goal of delivering malicious emails."

The following document describes Proofpoint’s response to this publication, including critical clarifications, impact to customers, and mitigations customers can implement.

The specific detection engine cited in the research (MLX) is a spam detection engine that is commonly used in conjunction with Proofpoint’s Stateful Composite Scoring Service (SCSS) as part of Proofpoint Email Protection. The newer SCSS engine updates its scoring model in real-time and uniquely per recipient, and thus is not susceptible to the batch reverse-engineering technique described in the research. Proofpoint Targeted Attack Protection (TAP) is not impacted, nor are any other Proofpoint products. It is also important to note that the MLX scoring engine and scores modeled by this research are only used for spam detection, and are not used for detection or blocking of viruses or malware. Additionally, the “mlxlogscore” score which was modeled is an interim score in the MLX engine and is not used directly in the product for spam blocking.

To obtain favorable spam scores this tactic assumes the following:

Assumption Key Details
No active updating of spam rules by Proofpoint Proofpoint updates spam rules every 5 minutes
Allow for bounce messages to be created by (non-Proofpoint) downstream systems for invalid message recipients Best practice configurations recommend to configure the Recipient Verification feature of the Proofpoint Email Protection product to prevent this from occurring.
Are using the MLX engine as the only form of spam detection Proofpoint takes an ensembled detection approach to protect customers. The vast majority of Proofpoint customers leverage the real-time SCSS engine in addition for spam detection.

Revised CVSS Score

Base Score: 3.7 (Low)
Temporal Score: 3.5 (Low)
Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:T/RC:C

Affected versions / products

All Proofpoint Email Protection versions are impacted. Targeted Attack Protection (TAP) is not impacted.

Recommended mitigations

Ensure you have a recent health check to ensure optimal system performance. If you have concerns or questions on the following recommendations, please contact your Proofpoint representative to obtain a free health check of current configured products.

Recommended: Configure Recipient Verification

As noted above, properly configured Recipient Verification will ensure that messages to invalid recipients are not delivered to downstream mail servers and will not generate “bounce” messages with X-Proofpoint-Spam-Details headers. The following articles describe how to configure this feature, and Proofpoint Support and/or Professional Services can assist in configuration if desired.
https://proofpointcommunities.force.com/community/s/article/Video-How-to-create-a-recipient-verification-block
https://proofpointcommunities.force.com/community/s/article/Recipient-Verification-How-to-enable-and-how-to-trace-in-the-logs

Optional: Modify Spam Policies to not add X-Proofpoint-Spam-Details headers

Customers may also modify spam policies to not add the X-Proofpoint-Spam-Details header to any message. This header is predominantly used by customers for visibility into scoring results in downstream services, and removing it has no impact on product effectiveness or core functionality.