CVE-2019-25310

7.8 HIGH

📋 TL;DR

ActiveFax Server 6.92 Build 0316 has an unquoted service path vulnerability in its ActiveFaxServiceNT service. This allows local attackers with write access to system directories to place malicious executables that will be executed with administrative privileges when the service starts. Only systems running the vulnerable ActiveFax Server version are affected.

💻 Affected Systems

Products:
  • ActiveFax Server
Versions: 6.92 Build 0316
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows systems where ActiveFax Server is installed as a service with an unquoted path.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via arbitrary code execution with SYSTEM/administrative privileges, leading to complete control of the affected server.

🟠

Likely Case

Local privilege escalation where an authenticated user gains administrative privileges on the system.

🟢

If Mitigated

No impact if proper access controls prevent unauthorized users from writing to system directories.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to exploit.
🏢 Internal Only: HIGH - Internal attackers with standard user access can potentially escalate to administrative privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access and ability to write to a directory in the system path. Public exploit code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Later versions of ActiveFax Server

Vendor Advisory: https://www.actfax.com/

Restart Required: Yes

Instructions:

1. Upgrade to a newer version of ActiveFax Server. 2. Alternatively, manually edit the service path to include quotes around the executable path. 3. Restart the ActiveFaxServiceNT service.

🔧 Temporary Workarounds

Quote Service Path

windows

Manually add quotes around the service executable path in Windows Registry

sc config ActiveFaxServiceNT binPath= "\"C:\Program Files\ActiveFax\ActiveFaxServiceNT.exe\""

Restrict Directory Permissions

windows

Set strict permissions on directories in the system PATH to prevent unauthorized writes

icacls "C:\Program Files\ActiveFax" /deny Users:(OI)(CI)W

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized users from writing to directories in the system PATH
  • Monitor for unauthorized file creation in system directories and service-related registry changes

🔍 How to Verify

Check if Vulnerable:

Check if ActiveFaxServiceNT service path is unquoted: sc qc ActiveFaxServiceNT | findstr BINARY_PATH_NAME

Check Version:

Check ActiveFax Server version in program files directory or via installed programs list

Verify Fix Applied:

Verify service path now has quotes: sc qc ActiveFaxServiceNT | findstr BINARY_PATH_NAME should show quotes around the executable path

📡 Detection & Monitoring

Log Indicators:

  • Unexpected service restarts of ActiveFaxServiceNT
  • File creation events in system directories by non-admin users

Network Indicators:

  • None - this is a local privilege escalation vulnerability

SIEM Query:

EventID=4688 AND ProcessName LIKE '%ActiveFaxServiceNT%' AND CommandLine NOT CONTAINS '"'

🔗 References

📤 Share & Export