Libraseva calls on users to patch now as it issues emergency after attack


  • Libraesva patched cve-2025-59689, a Medium-Service Guard Command Vulnerability
  • Attacks utilized compressed E -Mail -attached files; Threat actor probably a hostile foreign state
  • Versions below 5.0 are not supported and requires manual upgrades to remain safe

Liblaesva E-Mail Security Gateway (ESG) has patched a medium-difficulty vulnerability that has apparently been abused by state-sponsored threat actors to achieve remote command (RCE) features on targeted final points.

In a security advice, Libraesva announced addressing a command injection error that can be triggered by a malicious e email with a specially designed compressed attachment.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top