CVE-2025-34428
📋 TL;DR
MailEnable versions before 10.54 store user and administrative passwords in plaintext within the AUTH.SAV file with overly permissive filesystem permissions. This allows any local authenticated user with read access to recover all passwords and use them to access mail services or gain administrative control. Organizations running vulnerable MailEnable versions are affected.
💻 Affected Systems
- MailEnable
📦 What is this software?
Mailenable by Mailenable
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of all mail accounts, administrative takeover of MailEnable services, and potential lateral movement using stolen credentials across the network.
Likely Case
Local authenticated users accessing other users' mailboxes, reading sensitive emails, and potentially escalating privileges to administrative control.
If Mitigated
Limited to users who already have local authenticated access, but still enables credential theft and privilege escalation within the mail system.
🎯 Exploit Status
Exploitation requires local authenticated access but is trivial once that access is obtained - simply reading the AUTH.SAV file reveals all credentials.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 10.54
Vendor Advisory: https://mailenable.com/Standard-ReleaseNotes.txt
Restart Required: Yes
Instructions:
1. Download MailEnable version 10.54 or later from the official website. 2. Run the installer to upgrade. 3. Restart MailEnable services. 4. Verify the AUTH.SAV file now contains encrypted credentials.
🔧 Temporary Workarounds
Restrict AUTH.SAV file permissions
windowsModify filesystem permissions on the AUTH.SAV file to restrict read access to only necessary system accounts.
icacls "C:\Program Files\Mail Enable\Config\AUTH.SAV" /inheritance:r
icacls "C:\Program Files\Mail Enable\Config\AUTH.SAV" /grant SYSTEM:F
icacls "C:\Program Files\Mail Enable\Config\AUTH.SAV" /grant "MailEnable Service Account":R
🧯 If You Can't Patch
- Implement strict access controls to limit which users have local authenticated access to MailEnable servers.
- Monitor access to the AUTH.SAV file using Windows audit logging and alert on any unauthorized read attempts.
🔍 How to Verify
Check if Vulnerable:
Check if MailEnable version is below 10.54 and examine the AUTH.SAV file for plaintext passwords.
Check Version:
Check MailEnable version in the web admin interface or examine the installation directory for version information.
Verify Fix Applied:
After upgrading to 10.54+, verify that passwords in AUTH.SAV are encrypted and not in plaintext.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed authentication attempts followed by successful logins from unusual locations
- Unusual access patterns to mail services from previously unused accounts
Network Indicators:
- POP3/SMTP/webmail authentication from unexpected IP addresses
- Administrative interface access from non-admin users
SIEM Query:
source="windows_security" EventID=4663 ObjectName="*AUTH.SAV*" AccessMask=0x1