Paramount Macrium Reflect through 2025-06-26 allows local attackers to execute arbitrary code with administrator privileges via a crafted .mrimgx backup file and a malicious VSSSvr.dll located in the same directory. When a user with administrative privileges mounts a backup by opening the .mrimgx file, Reflect loads the attacker's VSSSvr.dll after the mount completes. This occurs because of untrusted DLL search path behavior in ReflectMonitor.exe.
                
            References
                    Configurations
                    No configuration.
History
                    05 Aug 2025, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-427 | 
05 Aug 2025, 14:34
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
04 Aug 2025, 19:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-08-04 19:15
Updated : 2025-08-05 15:15
NVD link : CVE-2025-53395
Mitre link : CVE-2025-53395
CVE.ORG link : CVE-2025-53395
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-427
                        
            Uncontrolled Search Path Element
