Paramount Macrium Reflect through 2025-06-26 allows attackers to execute arbitrary code with administrator privileges via a crafted .mrimgx or .mrbax backup file and a renamed executable placed in the same directory. When a user with administrative privileges opens the crafted backup file and proceeds to mount it, Reflect launches the renamed executable (e.g., explorer.exe), which is under attacker control. This occurs because of insufficient validation of companion files referenced during backup mounting.
References
Configurations
No configuration.
History
05 Aug 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-427 |
05 Aug 2025, 14:34
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
04 Aug 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-04 19:15
Updated : 2025-08-05 15:15
NVD link : CVE-2025-53394
Mitre link : CVE-2025-53394
CVE.ORG link : CVE-2025-53394
JSON object : View
Products Affected
No product.
CWE
CWE-427
Uncontrolled Search Path Element