Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12838: CWE-59: Improper Link Resolution Before File Access ('Link Following') in MSP360 Free Backup

0
High
VulnerabilityCVE-2025-12838cvecve-2025-12838cwe-59
Published: Tue Dec 23 2025 (12/23/2025, 21:41:11 UTC)
Source: CVE Database V5
Vendor/Project: MSP360
Product: Free Backup

Description

CVE-2025-12838 is a high-severity local privilege escalation vulnerability in MSP360 Free Backup version 8. 1. 0. 620. It arises from improper link resolution before file access in the restore functionality, allowing attackers with low-privileged code execution to escalate privileges to SYSTEM by abusing junction points. Exploitation requires local code execution and administrative user interaction, making it a targeted but potent threat. The vulnerability can lead to full system compromise, affecting confidentiality, integrity, and availability. No known exploits are currently in the wild, but the risk remains significant due to the potential impact. European organizations using MSP360 Free Backup should prioritize patching and implement strict local access controls. Countries with higher MSP360 adoption and critical infrastructure reliance on backup solutions are at greater risk.

AI-Powered Analysis

AILast updated: 12/31/2025, 00:23:19 UTC

Technical Analysis

CVE-2025-12838 is a local privilege escalation vulnerability identified in MSP360 Free Backup version 8.1.0.620, classified under CWE-59 (Improper Link Resolution Before File Access). The flaw exists in the restore functionality, where the software improperly handles junction points (a type of symbolic link in Windows). An attacker who already has the ability to execute low-privileged code on the system can create a malicious junction point that the backup service follows during restore operations. This improper link resolution allows the attacker to trick the service into creating or overwriting arbitrary files with elevated SYSTEM privileges. Exploiting this vulnerability requires two conditions: the attacker must have local code execution capabilities with low privileges, and an administrator must perform some interaction, likely initiating or approving a restore operation. Successful exploitation results in arbitrary code execution with SYSTEM-level privileges, enabling complete control over the affected system. Although no public exploits are known at this time, the vulnerability's CVSS score of 7.3 reflects its high impact on confidentiality, integrity, and availability. The vulnerability was reserved and published by the Zero Day Initiative (ZDI) under identifier ZDI-CAN-27245, indicating credible research and validation. The lack of available patches at the time of disclosure necessitates immediate risk mitigation through operational controls.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in environments where MSP360 Free Backup is deployed for critical data protection. Successful exploitation can lead to full system compromise, allowing attackers to access sensitive data, disrupt backup and restore processes, and potentially move laterally within networks. This can undermine business continuity and data integrity, impacting sectors such as finance, healthcare, and government services that rely heavily on backup solutions. The requirement for local code execution and administrative interaction limits remote exploitation but does not eliminate risk, particularly in organizations with inadequate endpoint security or insider threats. The high severity rating underscores the potential for serious operational and reputational damage. Organizations with MSP360 Free Backup installations should assess their exposure and prioritize mitigation to prevent privilege escalation attacks that could facilitate broader intrusions.

Mitigation Recommendations

1. Restrict local user permissions rigorously to prevent unauthorized code execution, especially on systems running MSP360 Free Backup. 2. Implement strict administrative controls and minimize the number of users with restore operation privileges to reduce the risk of malicious or accidental exploitation. 3. Monitor file system activities for suspicious creation of junction points or symbolic links, particularly in directories used by MSP360 for restore operations. 4. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect and block attempts to exploit this vulnerability. 5. Isolate backup servers and restrict network access to trusted administrators only, reducing the attack surface. 6. Stay informed on vendor advisories and apply patches or updates promptly once released. 7. Conduct regular security training to raise awareness about the risks of local privilege escalation and the importance of cautious administrative interactions. 8. Consider implementing multi-factor authentication for administrative actions related to backup and restore processes to add an additional security layer.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2025-11-06T20:08:27.746Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 694b1125d69af40f31323137

Added to database: 12/23/2025, 10:01:09 PM

Last enriched: 12/31/2025, 12:23:19 AM

Last updated: 2/4/2026, 2:38:39 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats