When the service of ABP and AES is installed in a directory writable by non-administrative users, an attacker can replace or plant a DLL with the same name as one loaded by the service. Upon service restart, the malicious DLL is loaded and executed under the LocalSystem account, resulting in unauthorized code execution with elevated privileges.
This issue affects ABP and AES: from ABP 2.0 through 2.0.7.9050, from AES 1.0 through 1.0.6.8290.
Metrics
Affected Vendors & Products
References
History
Thu, 20 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Asustor
Asustor abp Asustor aes Microsoft Microsoft windows |
|
| Vendors & Products |
Asustor
Asustor abp Asustor aes Microsoft Microsoft windows |
Wed, 19 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 19 Nov 2025 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When the service of ABP and AES is installed in a directory writable by non-administrative users, an attacker can replace or plant a DLL with the same name as one loaded by the service. Upon service restart, the malicious DLL is loaded and executed under the LocalSystem account, resulting in unauthorized code execution with elevated privileges. This issue affects ABP and AES: from ABP 2.0 through 2.0.7.9050, from AES 1.0 through 1.0.6.8290. | |
| Title | Windows service used an uncontrolled search path element will cause unauthorized code execution with localsystem privileges | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: ASUSTOR1
Published: 2025-11-19T02:50:57.285Z
Updated: 2025-11-19T20:04:20.177Z
Reserved: 2025-11-12T10:01:29.924Z
Link: CVE-2025-13051
Updated: 2025-11-19T20:04:15.109Z
Status : Awaiting Analysis
Published: 2025-11-19T04:16:05.317
Modified: 2025-11-19T19:14:59.327
Link: CVE-2025-13051
No data.