Stack-Based Buffer Overflow in Active! mail by Qualitia
CVE-2025-42599
Key Information:
- Vendor
Qualitia Co., Ltd.
- Status
- Vendor
- CVE Published:
- 18 April 2025
Badges
What is CVE-2025-42599?
CVE-2025-42599 is a vulnerability identified in Active! mail, a product developed by Qualitia Co., Ltd. Designed for email management, Active! mail is utilized by organizations to streamline communication processes. The vulnerability involves a stack-based buffer overflow, which could allow remote, unauthenticated attackers to exploit the system. If successfully executed, this could result in severe repercussions for organizations, including arbitrary code execution or denial-of-service (DoS) conditions, compromising the integrity and availability of email services vital for business operations.
Technical Details
CVE-2025-42599 specifically affects Active! mail versions 6 BuildInfo: 6.60.05008561 and earlier. The vulnerability arises when the application processes specially crafted requests sent by an attacker. Due to the nature of the buffer overflow, the application could overwrite critical areas in memory, leading to unexpected behavior. This could enable attackers to execute arbitrary code, manipulate data, or cause service interruptions.
Potential impact of CVE-2025-42599
-
Arbitrary Code Execution: Attackers could leverage the vulnerability to run unauthorized commands, potentially leading to full system compromise, data exfiltration, or the installation of malicious software.
-
Denial of Service (DoS): The exploitation of this vulnerability could result in service disruptions, rendering the email system inoperable. This could severely impact organizational communication and productivity.
-
Data Integrity Risks: The ability to execute arbitrary code may allow attackers to alter, delete, or corrupt data handled by the Active! mail system, posing significant risks to data integrity and compliance with regulatory requirements.
CISA has reported CVE-2025-42599
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2025-42599 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace
The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Affected Version(s)
Active! mail 6 BuildInfo: 6.60.05008561 and earlier
News Articles
References
EPSS Score
14% chance of being exploited in the next 30 days.
CVSS V3.1
CVSS V3.0
Timeline
- 📰
First article discovered by CISA (.gov)
- 👾
Exploit known to exist
- 🦅
CISA Reported
- 🥇
Vulnerability reached the number 1 worldwide trending spot
- 📈
Vulnerability started trending
Vulnerability published
Vulnerability Reserved