Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12247: Unquoted Search Path in Hasleo Backup Suite

0
High
VulnerabilityCVE-2025-12247cvecve-2025-12247
Published: Mon Oct 27 2025 (10/27/2025, 08:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Hasleo
Product: Backup Suite

Description

A weakness has been identified in Hasleo Backup Suite up to 5.2. Impacted is an unknown function of the component HasleoImageMountService/HasleoBackupSuiteService. This manipulation causes unquoted search path. The attack is restricted to local execution. The attack's complexity is rated as high. The exploitability is considered difficult. The exploit has been made available to the public and could be exploited. Upgrading the affected component is advised.

AI-Powered Analysis

AILast updated: 11/03/2025, 08:33:47 UTC

Technical Analysis

CVE-2025-12247 is a vulnerability classified as an unquoted search path weakness in Hasleo Backup Suite versions 5.0 through 5.2. The flaw resides within an unspecified function of the HasleoImageMountService or HasleoBackupSuiteService component. Unquoted search path vulnerabilities occur when a service or application executable path contains spaces but is not enclosed in quotes, allowing an attacker to place a malicious executable in a directory that is searched before the legitimate one. This can lead to arbitrary code execution when the service starts or restarts. The attack vector is local, requiring the attacker to have low-level privileges on the system. The complexity is high, indicating that exploitation is not straightforward and may require specific conditions or knowledge. The CVSS 4.0 score of 7.3 reflects a high severity, with the vector indicating local attack vector (AV:L), high attack complexity (AC:H), no user interaction (UI:N), and low privileges required (PR:L). The vulnerability affects confidentiality, integrity, and availability, as an attacker could execute code with elevated privileges or disrupt backup operations. Although no exploits have been observed in the wild, proof-of-concept code has been publicly disclosed, increasing the risk of future exploitation. The recommended remediation is upgrading to a fixed version of Hasleo Backup Suite once available. In the interim, organizations should audit service executable paths for unquoted spaces and restrict local access to trusted users only.

Potential Impact

For European organizations, the impact of CVE-2025-12247 can be significant, especially for those relying on Hasleo Backup Suite for critical backup and recovery operations. Successful exploitation could allow a local attacker to execute arbitrary code with elevated privileges, potentially leading to unauthorized access to sensitive backup data, disruption of backup services, or further lateral movement within the network. This could compromise data confidentiality and integrity, and impact availability by disabling or corrupting backup processes. Sectors such as finance, healthcare, government, and critical infrastructure that depend on reliable backup solutions are particularly at risk. The local attack vector limits remote exploitation, but insider threats or attackers who have gained initial footholds could leverage this vulnerability to escalate privileges or persist within systems. The public availability of exploit code increases the urgency for mitigation to prevent exploitation in European environments.

Mitigation Recommendations

1. Upgrade Hasleo Backup Suite to the latest patched version as soon as it becomes available from the vendor. 2. In the interim, perform a thorough audit of all service executable paths related to Hasleo Backup Suite and its services to ensure that any paths containing spaces are properly quoted to prevent unquoted search path exploitation. 3. Restrict local system access to trusted administrators and users only, minimizing the risk of local attackers exploiting this vulnerability. 4. Implement application whitelisting to prevent unauthorized executables from running in directories that are part of the service search path. 5. Monitor system logs and backup service behavior for unusual activity that could indicate exploitation attempts. 6. Educate IT staff about the risks of unquoted search path vulnerabilities and the importance of secure service configuration. 7. Consider deploying endpoint detection and response (EDR) solutions capable of detecting suspicious local execution or privilege escalation attempts related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-26T05:18:20.122Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ff2ce08f87cfec3de104eb

Added to database: 10/27/2025, 8:27:12 AM

Last enriched: 11/3/2025, 8:33:47 AM

Last updated: 12/8/2025, 2:46:38 PM

Views: 133

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats