CVE-2025-34396
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-09

Last updated on: 2025-12-10

Assigner: VulnCheck

Description
MailEnable versions prior to 10.54 contain an unsafe DLL loading vulnerability that can lead to local arbitrary code execution. The MailEnable administrative executable attempts to load MEAINFY.DLL from its application directo without sufficient integrity validation or secure search order. If the DLL is missing or attacker-writable locations in the search path are used, a local attacker with write permissions to the directory can plant a malicious MEAINFY.DLL. When the executable is launched, it loads the attacker-controlled library and executes code with the privileges of the process, enabling local privilege escalation when run with elevated rights.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-09
Last Modified
2025-12-10
Generated
2026-05-07
AI Q&A
2025-12-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
mailenable mailenable *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-427 The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an unsafe DLL loading issue in MailEnable versions prior to 10.54. The MailEnable administrative executable tries to load a DLL named MEAINFY.DLL from its application directory without properly validating its integrity or using a secure search order. If the DLL is missing or if attacker-writable locations are in the search path, a local attacker with write permissions can place a malicious MEAINFY.DLL. When the executable runs, it loads this malicious DLL and executes code with the process's privileges, potentially leading to local privilege escalation if run with elevated rights.


How can this vulnerability impact me? :

This vulnerability can allow a local attacker with write access to the application directory to execute arbitrary code with the privileges of the MailEnable administrative process. If the process runs with elevated rights, this can lead to local privilege escalation, giving the attacker higher-level access to the system than they should have.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, ensure that the MEAINFY.DLL file is not missing and that the application directory and its search path do not include attacker-writable locations. Restrict write permissions to the MailEnable application directory to trusted users only. Additionally, update MailEnable to version 10.54 or later where this vulnerability is fixed.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

To detect this vulnerability on your system, you should check the presence and integrity of the MEAINFY.DLL file in the MailEnable application directory and verify that no attacker-writable directories are in the DLL search path. Specifically, you can: 1) Verify if MEAINFY.DLL exists in the application directory. 2) Check the permissions of the application directory to ensure that unprivileged users cannot write or modify files there. 3) Look for suspicious or unexpected MEAINFY.DLL files. Suggested commands on a Windows system include: - To check the DLL file existence and properties: dir "<MailEnable_Install_Dir>\MEAINFY.DLL" /a - To check directory permissions: icacls "<MailEnable_Install_Dir>" - To search for MEAINFY.DLL files elsewhere: where /r C:\ MEAINFY.DLL - To check running processes and loaded modules (to detect if a malicious DLL is loaded): tasklist /m MEAINFY.DLL These steps help identify if the vulnerable DLL is missing, replaced, or if the directory permissions allow unauthorized modifications, which are indicators of exploitation risk. [3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart