CVE-2025-34396
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-10
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mailenable | mailenable | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-427 | The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an unsafe DLL loading issue in MailEnable versions prior to 10.54. The MailEnable administrative executable tries to load a DLL named MEAINFY.DLL from its application directory without properly validating its integrity or using a secure search order. If the DLL is missing or if attacker-writable locations are in the search path, a local attacker with write permissions can place a malicious MEAINFY.DLL. When the executable runs, it loads this malicious DLL and executes code with the process's privileges, potentially leading to local privilege escalation if run with elevated rights.
How can this vulnerability impact me? :
This vulnerability can allow a local attacker with write access to the application directory to execute arbitrary code with the privileges of the MailEnable administrative process. If the process runs with elevated rights, this can lead to local privilege escalation, giving the attacker higher-level access to the system than they should have.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that the MEAINFY.DLL file is not missing and that the application directory and its search path do not include attacker-writable locations. Restrict write permissions to the MailEnable application directory to trusted users only. Additionally, update MailEnable to version 10.54 or later where this vulnerability is fixed.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
To detect this vulnerability on your system, you should check the presence and integrity of the MEAINFY.DLL file in the MailEnable application directory and verify that no attacker-writable directories are in the DLL search path. Specifically, you can: 1) Verify if MEAINFY.DLL exists in the application directory. 2) Check the permissions of the application directory to ensure that unprivileged users cannot write or modify files there. 3) Look for suspicious or unexpected MEAINFY.DLL files. Suggested commands on a Windows system include: - To check the DLL file existence and properties: dir "<MailEnable_Install_Dir>\MEAINFY.DLL" /a - To check directory permissions: icacls "<MailEnable_Install_Dir>" - To search for MEAINFY.DLL files elsewhere: where /r C:\ MEAINFY.DLL - To check running processes and loaded modules (to detect if a malicious DLL is loaded): tasklist /m MEAINFY.DLL These steps help identify if the vulnerable DLL is missing, replaced, or if the directory permissions allow unauthorized modifications, which are indicators of exploitation risk. [3]