CVE-2025-53395
BaseFortify
Publication date: 2025-08-04
Last updated on: 2025-08-05
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| paramount | macrium_reflect | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-427 | The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Paramount Macrium Reflect allows a local attacker to execute arbitrary code with administrator privileges by placing a malicious VSSSvr.dll file in the same directory as a crafted .mrimgx backup file. When an administrator mounts the backup by opening the .mrimgx file, the software loads the attacker's DLL due to untrusted DLL search path behavior in ReflectMonitor.exe.
How can this vulnerability impact me? :
An attacker with local access can gain administrator-level code execution on the affected system, potentially leading to full system compromise, data loss, or unauthorized changes to system configurations.