Paramount Macrium Reflect through 2025-06-26 allows local attackers to execute arbitrary code with administrator privileges via a crafted .mrimgx backup file and a malicious VSSSvr.dll located in the same directory. When a user with administrative privileges mounts a backup by opening the .mrimgx file, Reflect loads the attacker's VSSSvr.dll after the mount completes. This occurs because of untrusted DLL search path behavior in ReflectMonitor.exe.
References
Configurations
No configuration.
History
05 Aug 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-427 |
05 Aug 2025, 14:34
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
04 Aug 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-04 19:15
Updated : 2025-08-05 15:15
NVD link : CVE-2025-53395
Mitre link : CVE-2025-53395
CVE.ORG link : CVE-2025-53395
JSON object : View
Products Affected
No product.
CWE
CWE-427
Uncontrolled Search Path Element