CVE-2024-46462

7.8 HIGH

📋 TL;DR

This vulnerability allows unauthorized users to access dedicated ZEDMAIL folders on Windows systems, potentially enabling privilege escalation by misusing technical files. It affects ZEDMAIL for Windows installations with default configurations up to version 2024.3. Organizations using ZEDMAIL on multi-user Windows systems are at risk.

💻 Affected Systems

Products:
  • ZEDMAIL for Windows
Versions: Up to 2024.3
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects default configurations where dedicated folders have improper permissions. Multi-user Windows environments are particularly vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could execute arbitrary code with elevated privileges, potentially gaining full system control, accessing sensitive data, or installing persistent malware.

🟠

Likely Case

Unauthorized users accessing and modifying ZEDMAIL configuration files to gain elevated privileges for specific ZEDMAIL-related operations.

🟢

If Mitigated

Limited impact with proper folder permissions and configuration hardening, restricting access to authorized users only.

🌐 Internet-Facing: LOW - This requires local system access, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Significant risk on shared Windows systems where multiple users have local access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the Windows system. The vulnerability is in folder permissions, making exploitation straightforward for users with local access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.4 or later

Vendor Advisory: https://www.primx.eu/en/bulletins/security-bulletin-24931936/

Restart Required: Yes

Instructions:

1. Download ZEDMAIL version 2024.4 or later from the official vendor site. 2. Run the installer to upgrade. 3. Restart the system to apply changes. 4. Verify folder permissions are properly configured post-upgrade.

🔧 Temporary Workarounds

Restrict ZEDMAIL Folder Permissions

windows

Manually adjust folder permissions to restrict access to authorized users only.

icacls "C:\Program Files\ZEDMAIL\dedicated_folders" /inheritance:r /grant:r "DOMAIN\AuthorizedUser:(OI)(CI)F" /grant:r "SYSTEM:(OI)(CI)F"
icacls "C:\ProgramData\ZEDMAIL\dedicated_folders" /inheritance:r /grant:r "DOMAIN\AuthorizedUser:(OI)(CI)F" /grant:r "SYSTEM:(OI)(CI)F"

🧯 If You Can't Patch

  • Implement strict access controls on ZEDMAIL folders using Windows permissions to allow only authorized users.
  • Monitor access to ZEDMAIL folders and audit permission changes regularly.

🔍 How to Verify

Check if Vulnerable:

Check ZEDMAIL version via Help > About in the application. If version is 2024.3 or earlier, the system is vulnerable. Also verify folder permissions on dedicated ZEDMAIL folders.

Check Version:

In ZEDMAIL, navigate to Help > About to view version. Alternatively, check file properties of ZEDMAIL executable.

Verify Fix Applied:

Confirm ZEDMAIL version is 2024.4 or later and verify dedicated folders have restricted permissions (only SYSTEM and authorized users have full control).

📡 Detection & Monitoring

Log Indicators:

  • Windows Security logs showing unauthorized access attempts to ZEDMAIL folders
  • ZEDMAIL application logs showing unexpected configuration changes

Network Indicators:

  • No direct network indicators as this is a local privilege escalation vulnerability

SIEM Query:

EventID=4663 AND ObjectName LIKE '%ZEDMAIL%' AND AccessMask=0x100 OR EventID=4656 AND ObjectName LIKE '%ZEDMAIL%'

🔗 References

📤 Share & Export