CVE-2025-67745: CWE-402: Transmission of Private Resources into a New Sphere ('Resource Leak') in Aiven-Open myhoard
MyHoard is a daemon for creating, managing and restoring MySQL backups. Starting in version 1.0.1 and prior to version 1.3.0, in some cases, myhoard logs the whole backup info, including the encryption key. Version 1.3.0 fixes the issue. As a workaround, direct logs into /dev/null.
AI Analysis
Technical Summary
CVE-2025-67745 is a vulnerability classified under CWE-402 (Transmission of Private Resources into a New Sphere, or resource leak) affecting the MyHoard daemon developed by Aiven-Open. MyHoard is used to create, manage, and restore MySQL backups. In versions from 1.0.1 up to but not including 1.3.0, the daemon improperly logs detailed backup information, including the encryption keys used to secure the backups. This logging behavior results in sensitive cryptographic material being written to log files, which can be accessed by unauthorized users if log files are improperly secured or exposed. The vulnerability can be exploited remotely over the network with low privileges and does not require user interaction, increasing the risk of automated or stealthy attacks. The impact is primarily on confidentiality, as exposure of encryption keys can lead to unauthorized decryption of backup data, potentially compromising sensitive organizational information. Integrity impact is low since the vulnerability does not directly allow data modification, and availability is not affected. The issue was addressed in MyHoard version 1.3.0 by removing the logging of sensitive information. As an interim mitigation, administrators are advised to redirect logs to /dev/null to prevent sensitive data from being written to disk. No known exploits are reported in the wild as of the publication date. The CVSS v3.1 base score is 7.1, reflecting a high severity due to network attack vector, low attack complexity, and high confidentiality impact.
Potential Impact
For European organizations, the exposure of encryption keys through logs can lead to severe confidentiality breaches, allowing attackers to decrypt MySQL backups and access sensitive data such as personal information, financial records, or intellectual property. This can result in regulatory non-compliance, especially under GDPR, leading to legal penalties and reputational damage. Organizations relying on MyHoard for backup management in sectors like finance, healthcare, and critical infrastructure are particularly at risk. The vulnerability could facilitate lateral movement or data exfiltration if attackers gain access to logs. Although no known exploits exist currently, the ease of exploitation and the sensitive nature of the leaked data make this a significant threat. The impact on data integrity and system availability is minimal, but the confidentiality compromise alone warrants urgent remediation.
Mitigation Recommendations
European organizations should immediately upgrade MyHoard to version 1.3.0 or later, where the vulnerability is fixed. Until patching is possible, administrators should configure the daemon to redirect logs to /dev/null or an equivalent secure logging sink that prevents sensitive data from being stored on disk. Additionally, organizations should audit existing log files for exposure of encryption keys and rotate any compromised encryption keys used for backups. Access controls on log files should be tightened to restrict unauthorized access. Monitoring for unusual access patterns to backup logs and implementing network segmentation to limit access to backup management systems can reduce risk. Regular security reviews of backup and logging configurations should be conducted to prevent similar issues. Finally, organizations should consider encrypting logs or using secure logging frameworks that avoid storing sensitive information in plaintext.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-67745: CWE-402: Transmission of Private Resources into a New Sphere ('Resource Leak') in Aiven-Open myhoard
Description
MyHoard is a daemon for creating, managing and restoring MySQL backups. Starting in version 1.0.1 and prior to version 1.3.0, in some cases, myhoard logs the whole backup info, including the encryption key. Version 1.3.0 fixes the issue. As a workaround, direct logs into /dev/null.
AI-Powered Analysis
Technical Analysis
CVE-2025-67745 is a vulnerability classified under CWE-402 (Transmission of Private Resources into a New Sphere, or resource leak) affecting the MyHoard daemon developed by Aiven-Open. MyHoard is used to create, manage, and restore MySQL backups. In versions from 1.0.1 up to but not including 1.3.0, the daemon improperly logs detailed backup information, including the encryption keys used to secure the backups. This logging behavior results in sensitive cryptographic material being written to log files, which can be accessed by unauthorized users if log files are improperly secured or exposed. The vulnerability can be exploited remotely over the network with low privileges and does not require user interaction, increasing the risk of automated or stealthy attacks. The impact is primarily on confidentiality, as exposure of encryption keys can lead to unauthorized decryption of backup data, potentially compromising sensitive organizational information. Integrity impact is low since the vulnerability does not directly allow data modification, and availability is not affected. The issue was addressed in MyHoard version 1.3.0 by removing the logging of sensitive information. As an interim mitigation, administrators are advised to redirect logs to /dev/null to prevent sensitive data from being written to disk. No known exploits are reported in the wild as of the publication date. The CVSS v3.1 base score is 7.1, reflecting a high severity due to network attack vector, low attack complexity, and high confidentiality impact.
Potential Impact
For European organizations, the exposure of encryption keys through logs can lead to severe confidentiality breaches, allowing attackers to decrypt MySQL backups and access sensitive data such as personal information, financial records, or intellectual property. This can result in regulatory non-compliance, especially under GDPR, leading to legal penalties and reputational damage. Organizations relying on MyHoard for backup management in sectors like finance, healthcare, and critical infrastructure are particularly at risk. The vulnerability could facilitate lateral movement or data exfiltration if attackers gain access to logs. Although no known exploits exist currently, the ease of exploitation and the sensitive nature of the leaked data make this a significant threat. The impact on data integrity and system availability is minimal, but the confidentiality compromise alone warrants urgent remediation.
Mitigation Recommendations
European organizations should immediately upgrade MyHoard to version 1.3.0 or later, where the vulnerability is fixed. Until patching is possible, administrators should configure the daemon to redirect logs to /dev/null or an equivalent secure logging sink that prevents sensitive data from being stored on disk. Additionally, organizations should audit existing log files for exposure of encryption keys and rotate any compromised encryption keys used for backups. Access controls on log files should be tightened to restrict unauthorized access. Monitoring for unusual access patterns to backup logs and implementing network segmentation to limit access to backup management systems can reduce risk. Regular security reviews of backup and logging configurations should be conducted to prevent similar issues. Finally, organizations should consider encrypting logs or using secure logging frameworks that avoid storing sensitive information in plaintext.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-11T18:08:02.946Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69444e5e4eb3efac36a13dd1
Added to database: 12/18/2025, 6:56:30 PM
Last enriched: 12/18/2025, 7:11:20 PM
Last updated: 12/19/2025, 4:19:58 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.