Libraseva urges users to patcher now because it issues an emergency correction after attacks


  • Balancesva patche CVE-2025-59689, a vulnerability of remote control of the average severity
  • Attack compressed email attachments; threat actor probably a hostile foreign state
  • Versions less than 5.0 are not supported and require manual upgrades to stay safe

BALANCESVA Email Security Gateway (ESG) has corrected a vulnerability of the average severity apparently abused by the actors of the threat sponsored by the State to obtain remote control capacities (RCE) on targeted termination criteria.

In a security notice, Balancesva announced the fight against an order injection flaw which can be triggered by a malicious email with a specially designed compressed attachment.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top