AspEmail 5.6.0.2 contains a binary permission vulnerability that allows local users to escalate privileges through the Persits Software EmailAgent service. Attackers can exploit full write permissions in the BIN directory to replace the service executable and gain elevated system access.
Metrics
Affected Vendors & Products
References
History
Fri, 19 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 19 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AspEmail 5.6.0.2 contains a binary permission vulnerability that allows local users to escalate privileges through the Persits Software EmailAgent service. Attackers can exploit full write permissions in the BIN directory to replace the service executable and gain elevated system access. | |
| Title | AspEmail 5.6.0.2 Local Privilege Escalation via Binary Permission Vulnerability | |
| Weaknesses | CWE-732 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-19T21:52:30.727Z
Reserved: 2025-12-16T19:22:09.998Z
Link: CVE-2023-53949
Updated: 2025-12-19T21:52:17.072Z
Status : Received
Published: 2025-12-19T21:15:50.397
Modified: 2025-12-19T21:15:50.397
Link: CVE-2023-53949
No data.
OpenCVE Enrichment
No data.