When the service of ABP and AES is installed in a directory writable by non-administrative users, an attacker can replace or plant a DLL with the same name as one loaded by the service. Upon service restart, the malicious DLL is loaded and executed under the LocalSystem account, resulting in unauthorized code execution with elevated privileges. This issue affects ABP and AES: from ABP 2.0 through 2.0.7.9050, from AES 1.0 through 1.0.6.8290.
History

Thu, 20 Nov 2025 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Asustor
Asustor abp
Asustor aes
Microsoft
Microsoft windows
Vendors & Products Asustor
Asustor abp
Asustor aes
Microsoft
Microsoft windows

Wed, 19 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 19 Nov 2025 03:30:00 +0000

Type Values Removed Values Added
Description When the service of ABP and AES is installed in a directory writable by non-administrative users, an attacker can replace or plant a DLL with the same name as one loaded by the service. Upon service restart, the malicious DLL is loaded and executed under the LocalSystem account, resulting in unauthorized code execution with elevated privileges. This issue affects ABP and AES: from ABP 2.0 through 2.0.7.9050, from AES 1.0 through 1.0.6.8290.
Title Windows service used an uncontrolled search path element will cause unauthorized code execution with localsystem privileges
Weaknesses CWE-427
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: ASUSTOR1

Published: 2025-11-19T02:50:57.285Z

Updated: 2025-11-19T20:04:20.177Z

Reserved: 2025-11-12T10:01:29.924Z

Link: CVE-2025-13051

cve-icon Vulnrichment

Updated: 2025-11-19T20:04:15.109Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-19T04:16:05.317

Modified: 2025-11-19T19:14:59.327

Link: CVE-2025-13051

cve-icon Redhat

No data.