CVE-2025-43595: CWE-276 Incorrect Default Permissions in MSP360 Backup
An insecure file system permissions vulnerability in MSP360 Backup 4.3.1.115 allows a low privileged user to execute commands with root privileges in the 'Online Backup' folder. Upgrade to MSP360 Backup 4.4 (released on 2025-04-22).
AI Analysis
Technical Summary
CVE-2025-43595 is a high-severity vulnerability affecting MSP360 Backup version 4.3.1.115, categorized under CWE-276 (Incorrect Default Permissions). This vulnerability arises due to insecure file system permissions set on the 'Online Backup' folder within the affected software. Specifically, these improper permissions allow a low-privileged user on the system to execute commands with root-level privileges. The vulnerability does not require user interaction or authentication beyond low-level access, making it easier for an attacker who already has limited access to escalate privileges to the highest level on the system. The CVSS 4.0 score of 8.5 reflects the critical nature of this flaw, with a local attack vector (AV:L), low attack complexity (AC:L), no authentication required (AT:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (VC:H, VI:H, VA:H), indicating that an attacker could fully compromise the system, access sensitive backup data, modify or delete backups, or disrupt backup operations. The vulnerability is present due to incorrect default permissions, meaning that the software installation or configuration sets overly permissive access rights on a critical folder, which should have been restricted. MSP360 has addressed this issue in version 4.4, released on April 22, 2025, and users are strongly advised to upgrade. No known exploits are currently reported in the wild, but the ease of exploitation and severity suggest that exploitation could be straightforward once discovered by attackers.
Potential Impact
For European organizations, the impact of CVE-2025-43595 can be significant, especially for those relying on MSP360 Backup for critical data protection and disaster recovery. Successful exploitation allows an attacker with low privileges to gain root access, potentially leading to full system compromise. This can result in unauthorized access to sensitive backup data, data tampering, deletion of backups, or disruption of backup services, undermining business continuity and data integrity. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face increased risks of regulatory non-compliance and reputational damage. Additionally, the ability to escalate privileges locally could facilitate lateral movement within networks, increasing the threat scope. Given the critical role of backup solutions in incident response and recovery, this vulnerability could severely impair an organization's ability to recover from ransomware or other cyberattacks, amplifying operational and financial impacts.
Mitigation Recommendations
1. Immediate upgrade to MSP360 Backup version 4.4 or later, which contains the fix for this vulnerability, is the most effective mitigation. 2. Until the upgrade is applied, restrict access to systems running MSP360 Backup to trusted administrators only, minimizing the risk of low-privileged users exploiting the vulnerability. 3. Review and harden file system permissions on the 'Online Backup' folder manually to ensure that only authorized users and system processes have access, following the principle of least privilege. 4. Implement strict access controls and monitoring on backup servers, including auditing of file and folder permission changes and command execution logs. 5. Employ endpoint detection and response (EDR) solutions to detect unusual privilege escalation attempts or suspicious activities on backup servers. 6. Conduct regular vulnerability scans and penetration tests focusing on backup infrastructure to identify and remediate permission misconfigurations proactively. 7. Educate system administrators about the risks of default permissions and the importance of secure configuration management for backup software.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy
CVE-2025-43595: CWE-276 Incorrect Default Permissions in MSP360 Backup
Description
An insecure file system permissions vulnerability in MSP360 Backup 4.3.1.115 allows a low privileged user to execute commands with root privileges in the 'Online Backup' folder. Upgrade to MSP360 Backup 4.4 (released on 2025-04-22).
AI-Powered Analysis
Technical Analysis
CVE-2025-43595 is a high-severity vulnerability affecting MSP360 Backup version 4.3.1.115, categorized under CWE-276 (Incorrect Default Permissions). This vulnerability arises due to insecure file system permissions set on the 'Online Backup' folder within the affected software. Specifically, these improper permissions allow a low-privileged user on the system to execute commands with root-level privileges. The vulnerability does not require user interaction or authentication beyond low-level access, making it easier for an attacker who already has limited access to escalate privileges to the highest level on the system. The CVSS 4.0 score of 8.5 reflects the critical nature of this flaw, with a local attack vector (AV:L), low attack complexity (AC:L), no authentication required (AT:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (VC:H, VI:H, VA:H), indicating that an attacker could fully compromise the system, access sensitive backup data, modify or delete backups, or disrupt backup operations. The vulnerability is present due to incorrect default permissions, meaning that the software installation or configuration sets overly permissive access rights on a critical folder, which should have been restricted. MSP360 has addressed this issue in version 4.4, released on April 22, 2025, and users are strongly advised to upgrade. No known exploits are currently reported in the wild, but the ease of exploitation and severity suggest that exploitation could be straightforward once discovered by attackers.
Potential Impact
For European organizations, the impact of CVE-2025-43595 can be significant, especially for those relying on MSP360 Backup for critical data protection and disaster recovery. Successful exploitation allows an attacker with low privileges to gain root access, potentially leading to full system compromise. This can result in unauthorized access to sensitive backup data, data tampering, deletion of backups, or disruption of backup services, undermining business continuity and data integrity. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face increased risks of regulatory non-compliance and reputational damage. Additionally, the ability to escalate privileges locally could facilitate lateral movement within networks, increasing the threat scope. Given the critical role of backup solutions in incident response and recovery, this vulnerability could severely impair an organization's ability to recover from ransomware or other cyberattacks, amplifying operational and financial impacts.
Mitigation Recommendations
1. Immediate upgrade to MSP360 Backup version 4.4 or later, which contains the fix for this vulnerability, is the most effective mitigation. 2. Until the upgrade is applied, restrict access to systems running MSP360 Backup to trusted administrators only, minimizing the risk of low-privileged users exploiting the vulnerability. 3. Review and harden file system permissions on the 'Online Backup' folder manually to ensure that only authorized users and system processes have access, following the principle of least privilege. 4. Implement strict access controls and monitoring on backup servers, including auditing of file and folder permission changes and command execution logs. 5. Employ endpoint detection and response (EDR) solutions to detect unusual privilege escalation attempts or suspicious activities on backup servers. 6. Conduct regular vulnerability scans and penetration tests focusing on backup infrastructure to identify and remediate permission misconfigurations proactively. 7. Educate system administrators about the risks of default permissions and the importance of secure configuration management for backup software.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- cisa-cg
- Date Reserved
- 2025-04-16T17:27:51.989Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d9819c4522896dcbd863c
Added to database: 5/21/2025, 9:08:41 AM
Last enriched: 7/11/2025, 12:20:00 PM
Last updated: 8/11/2025, 4:45:37 PM
Views: 25
Related Threats
CVE-2025-52621: CWE-346 Origin Validation Error in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52620: CWE-20 Improper Input Validation in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52619: CWE-209 Generation of Error Message Containing Sensitive Information in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52618: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in HCL Software BigFix SaaS Remediate
MediumCVE-2025-43201: An app may be able to unexpectedly leak a user's credentials in Apple Apple Music Classical for Android
UnknownActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.