Vulnerability Description
AspEmail 5.6.0.2 contains a binary permission vulnerability that allows local users to escalate privileges through the Persits Software EmailAgent service. Attackers can exploit full write permissions in the BIN directory to replace the service executable and gain elevated system access.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://www.aspemail.com
- https://www.exploit-db.com/exploits/51380
- https://www.vulncheck.com/advisories/aspemail-local-privilege-escalation-via-bin
FAQ
What is CVE-2023-53949?
CVE-2023-53949 is a vulnerability with a CVSS score of 8.4 (HIGH). AspEmail 5.6.0.2 contains a binary permission vulnerability that allows local users to escalate privileges through the Persits Software EmailAgent service. Attackers can exploit full write permissions...
How severe is CVE-2023-53949?
CVE-2023-53949 has been rated HIGH with a CVSS base score of 8.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-53949?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.