Paramount Macrium Reflect through 2025-06-26 allows attackers to execute arbitrary code with administrator privileges via a crafted .mrimgx or .mrbax backup file and a renamed executable placed in the same directory. When a user with administrative privileges opens the crafted backup file and proceeds to mount it, Reflect launches the renamed executable (e.g., explorer.exe), which is under attacker control. This occurs because of insufficient validation of companion files referenced during backup mounting.
History

Tue, 05 Aug 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-427
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 05 Aug 2025 07:45:00 +0000

Type Values Removed Values Added
First Time appeared Macrium
Macrium reflect
Vendors & Products Macrium
Macrium reflect

Mon, 04 Aug 2025 18:45:00 +0000

Type Values Removed Values Added
Description Paramount Macrium Reflect through 2025-06-26 allows attackers to execute arbitrary code with administrator privileges via a crafted .mrimgx or .mrbax backup file and a renamed executable placed in the same directory. When a user with administrative privileges opens the crafted backup file and proceeds to mount it, Reflect launches the renamed executable (e.g., explorer.exe), which is under attacker control. This occurs because of insufficient validation of companion files referenced during backup mounting.
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AC:L/AV:L/A:H/C:H/I:H/PR:H/S:C/UI:R'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-08-04T00:00:00.000Z

Updated: 2025-08-05T14:30:31.120Z

Reserved: 2025-06-29T00:00:00.000Z

Link: CVE-2025-53394

cve-icon Vulnrichment

Updated: 2025-08-05T14:30:25.394Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-04T19:15:31.930

Modified: 2025-08-05T15:15:30.990

Link: CVE-2025-53394

cve-icon Redhat

No data.