When the service of ABP and AES is installed in a directory writable by non-administrative users, an attacker can replace or plant a DLL with the same name as one loaded by the service. Upon service restart, the malicious DLL is loaded and executed under the LocalSystem account, resulting in unauthorized code execution with elevated privileges.
This issue affects ABP and AES: from ABP 2.0 through 2.0.7.9050, from AES 1.0 through 1.0.6.8290.
Metrics
Affected Vendors & Products
References
History
Wed, 19 Nov 2025 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When the service of ABP and AES is installed in a directory writable by non-administrative users, an attacker can replace or plant a DLL with the same name as one loaded by the service. Upon service restart, the malicious DLL is loaded and executed under the LocalSystem account, resulting in unauthorized code execution with elevated privileges. This issue affects ABP and AES: from ABP 2.0 through 2.0.7.9050, from AES 1.0 through 1.0.6.8290. | |
| Title | Windows service used an uncontrolled search path element will cause unauthorized code execution with localsystem privileges | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: ASUSTOR1
Published: 2025-11-19T02:50:57.285Z
Updated: 2025-11-19T03:15:31.719Z
Reserved: 2025-11-12T10:01:29.924Z
Link: CVE-2025-13051
No data.
Status : Received
Published: 2025-11-19T04:16:05.317
Modified: 2025-11-19T04:16:05.317
Link: CVE-2025-13051
No data.
ReportizFlow