Vulnerability Details : CVE-2019-12926
MailEnable Enterprise Premium 10.23 did not use appropriate access control checks in a number of areas. As a result, it was possible to perform a number of actions, when logged in as a user, that that user should not have had permission to perform. It was also possible to gain access to areas within the application for which the accounts used were supposed to have insufficient access.
Products affected by CVE-2019-12926
- cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:*
- cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:*
- cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:*
- cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:*
- cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-12926
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 31 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-12926
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2019-12926
-
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-12926
-
http://www.mailenable.com/Premium-ReleaseNotes.txt
Release Notes;Vendor Advisory
-
https://www.nccgroup.trust/uk/our-research/technical-advisory-multiple-vulnerabilities-in-mailenable/
Technical Advisory: Multiple Vulnerabilities in MailEnableRelease Notes;Third Party Advisory
Jump to