MrBruh's Epic Blog

All vulnerability reports to MSI are bouncing due to a full mailbox

Today I tried to report a critical vulnerability I found in some MSI related software, which hopefully you all will be reading soon enough.

However, in the process of reporting their vulnerability I have run into an issue I think all security researchers should be aware of.

All vulnerability reports to psirt@msi.com are currently being blackholed, due to the destination inbox being full.

The exact error being:

Remote Server returned '554 5.2.2 mailbox full; STOREDRV.Deliver.Exception: QuotaExceededException.MapiExceptionShutoffQuotaExceeded;

I only realised my email had been blackholed, because their automated systems immediately replied with a blank response but containing two .eml attachments.

Usually when I get an immediate response back containing a .eml attachment it means the email has bounced. Further inspection of the .eml files confirmed this to be the case, and that the bounce was due to a full mailbox.

msi_blackhole.avif

The majority of researchers will likely not have realised this, meaning that weeks or months worth of reported vulnerabilities are remaining unpatched and exploitable because of MSI’s blunder.