CVE-2025-34489

GFI MailEssentials prior to version 21.8 is vulnerable to a local privilege escalation issue. A local attacker can escalate to NT Authority/SYSTEM by sending a crafted serialized payload to a .NET Remoting Service.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gfi:mailessentials:*:*:*:*:*:*:*:*

History

10 May 2025, 00:59

Type Values Removed Values Added
References () https://frycos.github.io/vulns4free/2025/04/28/mailessentials.html - () https://frycos.github.io/vulns4free/2025/04/28/mailessentials.html - Exploit
References () https://gfi.ai/products-and-solutions/network-security-solutions/mailessentials/resources/documentation/product-releases - () https://gfi.ai/products-and-solutions/network-security-solutions/mailessentials/resources/documentation/product-releases - Release Notes
First Time Gfi
Gfi mailessentials
CPE cpe:2.3:a:gfi:mailessentials:*:*:*:*:*:*:*:*

29 Apr 2025, 13:52

Type Values Removed Values Added
Summary
  • (es) Las versiones anteriores a la 21.8 de GFI MailEssentials son vulnerables a un problema de escalada de privilegios local. Un atacante local puede escalar a NT Authority/SYSTEM enviando un payload serializado y manipulado a un servicio remoto .NET.

28 Apr 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-28 19:15

Updated : 2025-05-10 00:59


NVD link : CVE-2025-34489

Mitre link : CVE-2025-34489

CVE.ORG link : CVE-2025-34489


JSON object : View

Products Affected

gfi

  • mailessentials
CWE
CWE-502

Deserialization of Untrusted Data