CVE-2025-30232
Published: 28 March 2025
Description
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Security Summary
CVE-2025-30232 is a use-after-free vulnerability (CWE-416) in the Exim mail transfer agent, affecting versions 4.96 through 4.98.1. Published on 2025-03-28, it carries a CVSS v3.1 base score of 8.1 (AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H), indicating a high-severity issue that could lead to privilege escalation for users with command-line access.
The vulnerability can be exploited by local attackers who have command-line access to the system but require no prior privileges (PR:N). Exploitation demands high attack complexity (AC:H) and no user interaction (UI:N), but success grants high impacts across confidentiality, integrity, and availability (C:H/I:H/A:H) within a changed scope (S:C), allowing privilege escalation.
Mitigation guidance is detailed in the Exim security advisory at https://www.exim.org/static/doc/security/CVE-2025-30232.txt and the OSS-Security mailing list post at http://www.openwall.com/lists/oss-security/2025/03/26/1.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Local use-after-free in Exim directly enables privilege escalation for command-line users via software exploitation.