Paramount Macrium Reflect through 2025-06-26 allows local attackers to execute arbitrary code with administrator privileges via a crafted .mrimgx backup file and a malicious VSSSvr.dll located in the same directory. When a user with administrative privileges mounts a backup by opening the .mrimgx file, Reflect loads the attacker's VSSSvr.dll after the mount completes. This occurs because of untrusted DLL search path behavior in ReflectMonitor.exe.
History

Tue, 05 Aug 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-427
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 05 Aug 2025 07:45:00 +0000

Type Values Removed Values Added
First Time appeared Macrium
Macrium reflect
Vendors & Products Macrium
Macrium reflect

Mon, 04 Aug 2025 18:45:00 +0000

Type Values Removed Values Added
Description Paramount Macrium Reflect through 2025-06-26 allows local attackers to execute arbitrary code with administrator privileges via a crafted .mrimgx backup file and a malicious VSSSvr.dll located in the same directory. When a user with administrative privileges mounts a backup by opening the .mrimgx file, Reflect loads the attacker's VSSSvr.dll after the mount completes. This occurs because of untrusted DLL search path behavior in ReflectMonitor.exe.
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AC:L/AV:L/A:H/C:H/I:H/PR:H/S:C/UI:R'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-08-04T00:00:00.000Z

Updated: 2025-08-05T14:29:34.000Z

Reserved: 2025-06-29T00:00:00.000Z

Link: CVE-2025-53395

cve-icon Vulnrichment

Updated: 2025-08-05T14:28:40.424Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-04T19:15:32.103

Modified: 2025-08-05T15:15:31.150

Link: CVE-2025-53395

cve-icon Redhat

No data.