Skip to main content

CVE-2025-43595: CWE-276 Incorrect Default Permissions in MSP360 Backup

High
VulnerabilityCVE-2025-43595cvecve-2025-43595cwe-276
Published: Thu May 01 2025 (05/01/2025, 21:12:58 UTC)
Source: CVE
Vendor/Project: MSP360
Product: Backup

Description

An insecure file system permissions vulnerability in MSP360 Backup 4.3.1.115 allows a low privileged user to execute commands with root privileges in the 'Online Backup' folder. Upgrade to MSP360 Backup 4.4 (released on 2025-04-22).

AI-Powered Analysis

AILast updated: 07/11/2025, 12:20:00 UTC

Technical Analysis

CVE-2025-43595 is a high-severity vulnerability affecting MSP360 Backup version 4.3.1.115, categorized under CWE-276 (Incorrect Default Permissions). This vulnerability arises due to insecure file system permissions set on the 'Online Backup' folder within the affected software. Specifically, these improper permissions allow a low-privileged user on the system to execute commands with root-level privileges. The vulnerability does not require user interaction or authentication beyond low-level access, making it easier for an attacker who already has limited access to escalate privileges to the highest level on the system. The CVSS 4.0 score of 8.5 reflects the critical nature of this flaw, with a local attack vector (AV:L), low attack complexity (AC:L), no authentication required (AT:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (VC:H, VI:H, VA:H), indicating that an attacker could fully compromise the system, access sensitive backup data, modify or delete backups, or disrupt backup operations. The vulnerability is present due to incorrect default permissions, meaning that the software installation or configuration sets overly permissive access rights on a critical folder, which should have been restricted. MSP360 has addressed this issue in version 4.4, released on April 22, 2025, and users are strongly advised to upgrade. No known exploits are currently reported in the wild, but the ease of exploitation and severity suggest that exploitation could be straightforward once discovered by attackers.

Potential Impact

For European organizations, the impact of CVE-2025-43595 can be significant, especially for those relying on MSP360 Backup for critical data protection and disaster recovery. Successful exploitation allows an attacker with low privileges to gain root access, potentially leading to full system compromise. This can result in unauthorized access to sensitive backup data, data tampering, deletion of backups, or disruption of backup services, undermining business continuity and data integrity. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face increased risks of regulatory non-compliance and reputational damage. Additionally, the ability to escalate privileges locally could facilitate lateral movement within networks, increasing the threat scope. Given the critical role of backup solutions in incident response and recovery, this vulnerability could severely impair an organization's ability to recover from ransomware or other cyberattacks, amplifying operational and financial impacts.

Mitigation Recommendations

1. Immediate upgrade to MSP360 Backup version 4.4 or later, which contains the fix for this vulnerability, is the most effective mitigation. 2. Until the upgrade is applied, restrict access to systems running MSP360 Backup to trusted administrators only, minimizing the risk of low-privileged users exploiting the vulnerability. 3. Review and harden file system permissions on the 'Online Backup' folder manually to ensure that only authorized users and system processes have access, following the principle of least privilege. 4. Implement strict access controls and monitoring on backup servers, including auditing of file and folder permission changes and command execution logs. 5. Employ endpoint detection and response (EDR) solutions to detect unusual privilege escalation attempts or suspicious activities on backup servers. 6. Conduct regular vulnerability scans and penetration tests focusing on backup infrastructure to identify and remediate permission misconfigurations proactively. 7. Educate system administrators about the risks of default permissions and the importance of secure configuration management for backup software.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2025-04-16T17:27:51.989Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd863c

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/11/2025, 12:20:00 PM

Last updated: 8/11/2025, 4:45:37 PM

Views: 25

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats