Remote Code Execution Vulnerability in Proself's Enterprise, Gateway, and Mail Sanitize Editions
CVE-2023-39416

7.2HIGH

Key Information:

Summary

Proself's Enterprise/Standard, Gateway, and Mail Sanitize Editions have a vulnerability that allows a remote authenticated attacker with administrative privileges to execute arbitrary operating system commands. This flaw poses significant risks as it enables attackers to manipulate the underlying system, potentially leading to data breaches and unauthorized access. Users of these affected products should apply patches and updates immediately to secure their systems.

Affected Version(s)

Proself Enterprise/Standard Edition Ver5.61 and earlier

Proself Gateway Edition Ver1.62 and earlier

Proself Mail Sanitize Edition Ver1.07 and earlier

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.