Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rhmx-9m9c-c72h

Опубликовано: 04 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 7.7

Описание

Paramount Macrium Reflect through 2025-06-26 allows local attackers to execute arbitrary code with administrator privileges via a crafted .mrimgx backup file and a malicious VSSSvr.dll located in the same directory. When a user with administrative privileges mounts a backup by opening the .mrimgx file, Reflect loads the attacker's VSSSvr.dll after the mount completes. This occurs because of untrusted DLL search path behavior in ReflectMonitor.exe.

Paramount Macrium Reflect through 2025-06-26 allows local attackers to execute arbitrary code with administrator privileges via a crafted .mrimgx backup file and a malicious VSSSvr.dll located in the same directory. When a user with administrative privileges mounts a backup by opening the .mrimgx file, Reflect loads the attacker's VSSSvr.dll after the mount completes. This occurs because of untrusted DLL search path behavior in ReflectMonitor.exe.

EPSS

Процентиль: 2%
0.00013
Низкий

7.7 High

CVSS3

Дефекты

CWE-427

Связанные уязвимости

CVSS3: 7.7
nvd
6 месяцев назад

Paramount Macrium Reflect through 2025-06-26 allows local attackers to execute arbitrary code with administrator privileges via a crafted .mrimgx backup file and a malicious VSSSvr.dll located in the same directory. When a user with administrative privileges mounts a backup by opening the .mrimgx file, Reflect loads the attacker's VSSSvr.dll after the mount completes. This occurs because of untrusted DLL search path behavior in ReflectMonitor.exe.

EPSS

Процентиль: 2%
0.00013
Низкий

7.7 High

CVSS3

Дефекты

CWE-427