Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wmch-8v9c-7prg

Опубликовано: 04 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 7.7

Описание

Paramount Macrium Reflect through 2025-06-26 allows attackers to execute arbitrary code with administrator privileges via a crafted .mrimgx or .mrbax backup file and a renamed executable placed in the same directory. When a user with administrative privileges opens the crafted backup file and proceeds to mount it, Reflect launches the renamed executable (e.g., explorer.exe), which is under attacker control. This occurs because of insufficient validation of companion files referenced during backup mounting.

Paramount Macrium Reflect through 2025-06-26 allows attackers to execute arbitrary code with administrator privileges via a crafted .mrimgx or .mrbax backup file and a renamed executable placed in the same directory. When a user with administrative privileges opens the crafted backup file and proceeds to mount it, Reflect launches the renamed executable (e.g., explorer.exe), which is under attacker control. This occurs because of insufficient validation of companion files referenced during backup mounting.

EPSS

Процентиль: 2%
0.00015
Низкий

7.7 High

CVSS3

Дефекты

CWE-427

Связанные уязвимости

CVSS3: 7.7
nvd
6 месяцев назад

Paramount Macrium Reflect through 2025-06-26 allows attackers to execute arbitrary code with administrator privileges via a crafted .mrimgx or .mrbax backup file and a renamed executable placed in the same directory. When a user with administrative privileges opens the crafted backup file and proceeds to mount it, Reflect launches the renamed executable (e.g., explorer.exe), which is under attacker control. This occurs because of insufficient validation of companion files referenced during backup mounting.

EPSS

Процентиль: 2%
0.00015
Низкий

7.7 High

CVSS3

Дефекты

CWE-427