Skip to main content

CVE-2025-8610: CWE-306: Missing Authentication for Critical Function in AOMEI Cyber Backup

Critical
VulnerabilityCVE-2025-8610cvecve-2025-8610cwe-306
Published: Wed Aug 20 2025 (08/20/2025, 16:25:52 UTC)
Source: CVE Database V5
Vendor/Project: AOMEI
Product: Cyber Backup

Description

AOMEI Cyber Backup Missing Authentication for Critical Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of AOMEI Cyber Backup. Authentication is not required to exploit this vulnerability. The specific flaw exists within the StorageNode service, which listens on TCP port 9075 by default. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-26156.

AI-Powered Analysis

AILast updated: 08/20/2025, 16:48:14 UTC

Technical Analysis

CVE-2025-8610 is a critical remote code execution vulnerability affecting AOMEI Cyber Backup version 3.7.0. The flaw resides in the StorageNode service, which by default listens on TCP port 9075. The vulnerability is classified as CWE-306, indicating a missing authentication for a critical function. Specifically, the StorageNode service does not require any authentication before granting access to sensitive functionality, allowing an unauthenticated remote attacker to execute arbitrary code with SYSTEM-level privileges. This means an attacker can fully compromise the affected system, gaining complete control over the backup environment and potentially the underlying host. The vulnerability has a CVSS v3.0 base score of 9.8, reflecting its critical severity with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits have been observed in the wild yet, the ease of exploitation and severity make this a significant threat. The lack of authentication on a network-exposed service that handles backup operations poses a severe risk, as attackers could manipulate backup data, disrupt backup processes, or use the compromised system as a foothold for lateral movement within an organization’s network. Given that backup systems often have elevated privileges and access to critical data, exploitation could lead to data loss, ransomware deployment, or full system compromise.

Potential Impact

For European organizations, the impact of this vulnerability could be severe. Backup systems like AOMEI Cyber Backup are integral to data protection and disaster recovery strategies. Compromise of such a system could lead to unauthorized data access, data tampering, or deletion, undermining data integrity and availability. Attackers gaining SYSTEM-level access could deploy ransomware or other malware, potentially causing widespread operational disruption. Given the critical nature of backup infrastructure, exploitation could affect business continuity, regulatory compliance (e.g., GDPR), and result in significant financial and reputational damage. Organizations relying on AOMEI Cyber Backup for critical data protection are at risk of losing control over their backup environments, which could also facilitate further attacks on connected systems. The vulnerability’s network-exposed nature and lack of authentication mean it can be exploited remotely without user interaction, increasing the likelihood of automated scanning and exploitation attempts targeting European networks.

Mitigation Recommendations

Immediate mitigation steps include isolating the StorageNode service from untrusted networks by restricting access to TCP port 9075 using network segmentation and firewall rules. Organizations should implement strict network-level access controls, allowing only trusted management hosts to communicate with the backup server. Monitoring network traffic for unusual connections to port 9075 can help detect exploitation attempts. Since no patch is currently available, consider disabling or stopping the StorageNode service if feasible until a vendor fix is released. Employ host-based intrusion detection systems (HIDS) to monitor for suspicious process creation or privilege escalation indicative of exploitation. Regularly audit backup server configurations and logs for unauthorized access attempts. Additionally, maintain offline or immutable backups to ensure recovery capability in case of compromise. Once a patch is released by AOMEI, prioritize its deployment across all affected systems. Finally, incorporate this vulnerability into incident response plans and conduct tabletop exercises to prepare for potential exploitation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2025-08-05T19:59:21.371Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68a5f8afad5a09ad0006e529

Added to database: 8/20/2025, 4:32:47 PM

Last enriched: 8/20/2025, 4:48:14 PM

Last updated: 8/22/2025, 12:34:56 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats