CVE-2025-34427

7.8 HIGH

📋 TL;DR

MailEnable versions before 10.54 store user and administrative passwords in plaintext within the AUTH.TAB file with overly permissive filesystem permissions. This allows any local authenticated user with read access to recover all passwords and use them to access mail services or gain administrative control. Organizations running vulnerable MailEnable versions are affected.

💻 Affected Systems

Products:
  • MailEnable
Versions: All versions prior to 10.54
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration; requires local authenticated access to the server filesystem.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all mail accounts, administrative takeover of the MailEnable server, and potential lateral movement to other systems using reused credentials.

🟠

Likely Case

Unauthorized access to user mailboxes, email exfiltration, and potential privilege escalation to administrative functions.

🟢

If Mitigated

Limited to credential exposure without successful authentication if network controls prevent unauthorized access to mail services.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access to read the AUTH.TAB file; trivial to extract credentials once file access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.54

Vendor Advisory: https://mailenable.com/Standard-ReleaseNotes.txt

Restart Required: Yes

Instructions:

1. Download MailEnable version 10.54 or later from the official website. 2. Run the installer to upgrade. 3. Restart MailEnable services. 4. Verify the AUTH.TAB file no longer contains plaintext passwords.

🔧 Temporary Workarounds

Restrict filesystem permissions on AUTH.TAB

windows

Set strict NTFS permissions on the AUTH.TAB file to prevent unauthorized read access.

icacls "C:\Program Files\Mail Enable\Config\AUTH.TAB" /inheritance:r /grant "SYSTEM:(F)" /grant "Administrators:(F)" /deny "Users:(R)"

🧯 If You Can't Patch

  • Implement strict access controls to limit who can log into the MailEnable server locally.
  • Monitor for unusual authentication attempts to mail services and implement network segmentation.

🔍 How to Verify

Check if Vulnerable:

Check if MailEnable version is below 10.54 and examine the AUTH.TAB file for plaintext password entries.

Check Version:

Check the version in MailEnable Management Console or examine the installation directory for version information.

Verify Fix Applied:

After upgrading to 10.54+, verify that passwords in AUTH.TAB are encrypted/hashed and not stored in plaintext.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful logins from unusual IPs
  • Administrative login events from non-admin users

Network Indicators:

  • Unusual POP3/SMTP/webmail traffic patterns
  • Authentication attempts using credentials from compromised accounts

SIEM Query:

source="mailenable.log" AND (event="authentication success" OR event="admin login") | stats count by user, src_ip

🔗 References

📤 Share & Export