Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67745: CWE-402: Transmission of Private Resources into a New Sphere ('Resource Leak') in Aiven-Open myhoard

0
High
VulnerabilityCVE-2025-67745cvecve-2025-67745cwe-402
Published: Thu Dec 18 2025 (12/18/2025, 18:37:50 UTC)
Source: CVE Database V5
Vendor/Project: Aiven-Open
Product: myhoard

Description

MyHoard is a daemon for creating, managing and restoring MySQL backups. Starting in version 1.0.1 and prior to version 1.3.0, in some cases, myhoard logs the whole backup info, including the encryption key. Version 1.3.0 fixes the issue. As a workaround, direct logs into /dev/null.

AI-Powered Analysis

AILast updated: 12/18/2025, 19:11:20 UTC

Technical Analysis

CVE-2025-67745 is a vulnerability classified under CWE-402 (Transmission of Private Resources into a New Sphere, or resource leak) affecting the MyHoard daemon developed by Aiven-Open. MyHoard is used to create, manage, and restore MySQL backups. In versions from 1.0.1 up to but not including 1.3.0, the daemon improperly logs detailed backup information, including the encryption keys used to secure the backups. This logging behavior results in sensitive cryptographic material being written to log files, which can be accessed by unauthorized users if log files are improperly secured or exposed. The vulnerability can be exploited remotely over the network with low privileges and does not require user interaction, increasing the risk of automated or stealthy attacks. The impact is primarily on confidentiality, as exposure of encryption keys can lead to unauthorized decryption of backup data, potentially compromising sensitive organizational information. Integrity impact is low since the vulnerability does not directly allow data modification, and availability is not affected. The issue was addressed in MyHoard version 1.3.0 by removing the logging of sensitive information. As an interim mitigation, administrators are advised to redirect logs to /dev/null to prevent sensitive data from being written to disk. No known exploits are reported in the wild as of the publication date. The CVSS v3.1 base score is 7.1, reflecting a high severity due to network attack vector, low attack complexity, and high confidentiality impact.

Potential Impact

For European organizations, the exposure of encryption keys through logs can lead to severe confidentiality breaches, allowing attackers to decrypt MySQL backups and access sensitive data such as personal information, financial records, or intellectual property. This can result in regulatory non-compliance, especially under GDPR, leading to legal penalties and reputational damage. Organizations relying on MyHoard for backup management in sectors like finance, healthcare, and critical infrastructure are particularly at risk. The vulnerability could facilitate lateral movement or data exfiltration if attackers gain access to logs. Although no known exploits exist currently, the ease of exploitation and the sensitive nature of the leaked data make this a significant threat. The impact on data integrity and system availability is minimal, but the confidentiality compromise alone warrants urgent remediation.

Mitigation Recommendations

European organizations should immediately upgrade MyHoard to version 1.3.0 or later, where the vulnerability is fixed. Until patching is possible, administrators should configure the daemon to redirect logs to /dev/null or an equivalent secure logging sink that prevents sensitive data from being stored on disk. Additionally, organizations should audit existing log files for exposure of encryption keys and rotate any compromised encryption keys used for backups. Access controls on log files should be tightened to restrict unauthorized access. Monitoring for unusual access patterns to backup logs and implementing network segmentation to limit access to backup management systems can reduce risk. Regular security reviews of backup and logging configurations should be conducted to prevent similar issues. Finally, organizations should consider encrypting logs or using secure logging frameworks that avoid storing sensitive information in plaintext.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-11T18:08:02.946Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69444e5e4eb3efac36a13dd1

Added to database: 12/18/2025, 6:56:30 PM

Last enriched: 12/18/2025, 7:11:20 PM

Last updated: 12/19/2025, 4:19:58 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats