When the service of ABP and AES is installed in a...
Critical severity
Unreviewed
Published
Nov 19, 2025
to the GitHub Advisory Database
•
Updated Nov 19, 2025
Description
Published by the National Vulnerability Database
Nov 19, 2025
Published to the GitHub Advisory Database
Nov 19, 2025
Last updated
Nov 19, 2025
When the service of ABP and AES is installed in a directory writable by non-administrative users, an attacker can replace or plant a DLL with the same name as one loaded by the service. Upon service restart, the malicious DLL is loaded and executed under the LocalSystem account, resulting in unauthorized code execution with elevated privileges.
This issue affects ABP and AES: from ABP 2.0 through 2.0.7.9050, from AES 1.0 through 1.0.6.8290.
References