Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-23534 | Paramount Macrium Reflect through 2025-06-26 allows attackers to execute arbitrary code with administrator privileges via a crafted .mrimgx or .mrbax backup file and a renamed executable placed in the same directory. When a user with administrative privileges opens the crafted backup file and proceeds to mount it, Reflect launches the renamed executable (e.g., explorer.exe), which is under attacker control. This occurs because of insufficient validation of companion files referenced during backup mounting. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 05 Aug 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-427 | |
| Metrics |
ssvc
|
Tue, 05 Aug 2025 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Macrium
Macrium reflect |
|
| Vendors & Products |
Macrium
Macrium reflect |
Mon, 04 Aug 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Paramount Macrium Reflect through 2025-06-26 allows attackers to execute arbitrary code with administrator privileges via a crafted .mrimgx or .mrbax backup file and a renamed executable placed in the same directory. When a user with administrative privileges opens the crafted backup file and proceeds to mount it, Reflect launches the renamed executable (e.g., explorer.exe), which is under attacker control. This occurs because of insufficient validation of companion files referenced during backup mounting. | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-08-05T14:30:31.120Z
Reserved: 2025-06-29T00:00:00.000Z
Link: CVE-2025-53394
Updated: 2025-08-05T14:30:25.394Z
Status : Awaiting Analysis
Published: 2025-08-04T19:15:31.930
Modified: 2025-08-05T15:15:30.990
Link: CVE-2025-53394
No data.
OpenCVE Enrichment
Updated: 2025-08-05T07:33:42Z
EUVD