CVE-2025-34428
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-10

Last updated on: 2025-12-17

Assigner: VulnCheck

Description
MailEnable versions prior to 10.54 contain a cleartext storage of credentials vulnerability that can lead to local credential compromise and account takeover. The product stores user and administrative passwords in plaintext within AUTH.SAV with overly permissive filesystem access. A local authenticated user with read access to this file can recover all user passwords and super-admin credentials, then use them to authenticate to MailEnable services such as POP3, SMTP, or the webmail interface, enabling unauthorized mailbox access and administrative control.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-10
Last Modified
2025-12-17
Generated
2026-05-07
AI Q&A
2025-12-10
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
mailenable mailenable *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-312 The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in MailEnable versions prior to 10.54, where user and administrative passwords are stored in plaintext within the AUTH.SAV file with overly permissive filesystem access. A local authenticated user with read access to this file can recover all user and admin passwords, leading to credential compromise and potential account takeover.


How can this vulnerability impact me? :

An attacker who has local authenticated access and can read the AUTH.SAV file can obtain all user and administrative passwords. This allows them to authenticate to MailEnable services such as POP3, SMTP, or the webmail interface, resulting in unauthorized mailbox access and administrative control, which can lead to data breaches and service disruption.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by checking for the presence of the AUTH.SAV file on the MailEnable server and verifying its permissions. Specifically, look for the file storing credentials in plaintext and check if local authenticated users have read access to it. Commands such as 'ls -l' on the directory containing AUTH.SAV can reveal file permissions. Additionally, inspecting the contents of AUTH.SAV (e.g., using 'cat AUTH.SAV') can confirm if passwords are stored in cleartext.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting filesystem permissions on the AUTH.SAV file to prevent unauthorized read access by local users. Ensure that only necessary administrative accounts have access to this file. Additionally, upgrade MailEnable to version 10.54 or later where this vulnerability is addressed. Regularly audit file permissions and monitor access to sensitive files to prevent credential compromise.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart