Paramount Macrium Reflect through 2025-06-26 allows attackers to execute arbitrary code with administrator privileges via a crafted .mrimgx or .mrbax backup file and a renamed executable placed in the same directory. When a user with administrative privileges opens the crafted backup file and proceeds to mount it, Reflect launches the renamed executable (e.g., explorer.exe), which is under attacker control. This occurs because of insufficient validation of companion files referenced during backup mounting.
Metrics
Affected Vendors & Products
References
History
Tue, 05 Aug 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-427 | |
Metrics |
ssvc
|
Tue, 05 Aug 2025 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Macrium
Macrium reflect |
|
Vendors & Products |
Macrium
Macrium reflect |
Mon, 04 Aug 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Paramount Macrium Reflect through 2025-06-26 allows attackers to execute arbitrary code with administrator privileges via a crafted .mrimgx or .mrbax backup file and a renamed executable placed in the same directory. When a user with administrative privileges opens the crafted backup file and proceeds to mount it, Reflect launches the renamed executable (e.g., explorer.exe), which is under attacker control. This occurs because of insufficient validation of companion files referenced during backup mounting. | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-08-04T00:00:00.000Z
Updated: 2025-08-05T14:30:31.120Z
Reserved: 2025-06-29T00:00:00.000Z
Link: CVE-2025-53394

Updated: 2025-08-05T14:30:25.394Z

Status : Awaiting Analysis
Published: 2025-08-04T19:15:31.930
Modified: 2025-08-05T15:15:30.990
Link: CVE-2025-53394

No data.