CVE-2025-8610: CWE-306: Missing Authentication for Critical Function in AOMEI Cyber Backup
AOMEI Cyber Backup Missing Authentication for Critical Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of AOMEI Cyber Backup. Authentication is not required to exploit this vulnerability. The specific flaw exists within the StorageNode service, which listens on TCP port 9075 by default. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-26156.
AI Analysis
Technical Summary
CVE-2025-8610 is a critical remote code execution vulnerability affecting AOMEI Cyber Backup version 3.7.0. The flaw resides in the StorageNode service, which by default listens on TCP port 9075. The vulnerability is classified as CWE-306, indicating a missing authentication for a critical function. Specifically, the StorageNode service does not require any authentication before granting access to sensitive functionality, allowing an unauthenticated remote attacker to execute arbitrary code with SYSTEM-level privileges. This means an attacker can fully compromise the affected system, gaining complete control over the backup environment and potentially the underlying host. The vulnerability has a CVSS v3.0 base score of 9.8, reflecting its critical severity with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits have been observed in the wild yet, the ease of exploitation and severity make this a significant threat. The lack of authentication on a network-exposed service that handles backup operations poses a severe risk, as attackers could manipulate backup data, disrupt backup processes, or use the compromised system as a foothold for lateral movement within an organization’s network. Given that backup systems often have elevated privileges and access to critical data, exploitation could lead to data loss, ransomware deployment, or full system compromise.
Potential Impact
For European organizations, the impact of this vulnerability could be severe. Backup systems like AOMEI Cyber Backup are integral to data protection and disaster recovery strategies. Compromise of such a system could lead to unauthorized data access, data tampering, or deletion, undermining data integrity and availability. Attackers gaining SYSTEM-level access could deploy ransomware or other malware, potentially causing widespread operational disruption. Given the critical nature of backup infrastructure, exploitation could affect business continuity, regulatory compliance (e.g., GDPR), and result in significant financial and reputational damage. Organizations relying on AOMEI Cyber Backup for critical data protection are at risk of losing control over their backup environments, which could also facilitate further attacks on connected systems. The vulnerability’s network-exposed nature and lack of authentication mean it can be exploited remotely without user interaction, increasing the likelihood of automated scanning and exploitation attempts targeting European networks.
Mitigation Recommendations
Immediate mitigation steps include isolating the StorageNode service from untrusted networks by restricting access to TCP port 9075 using network segmentation and firewall rules. Organizations should implement strict network-level access controls, allowing only trusted management hosts to communicate with the backup server. Monitoring network traffic for unusual connections to port 9075 can help detect exploitation attempts. Since no patch is currently available, consider disabling or stopping the StorageNode service if feasible until a vendor fix is released. Employ host-based intrusion detection systems (HIDS) to monitor for suspicious process creation or privilege escalation indicative of exploitation. Regularly audit backup server configurations and logs for unauthorized access attempts. Additionally, maintain offline or immutable backups to ensure recovery capability in case of compromise. Once a patch is released by AOMEI, prioritize its deployment across all affected systems. Finally, incorporate this vulnerability into incident response plans and conduct tabletop exercises to prepare for potential exploitation scenarios.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-8610: CWE-306: Missing Authentication for Critical Function in AOMEI Cyber Backup
Description
AOMEI Cyber Backup Missing Authentication for Critical Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of AOMEI Cyber Backup. Authentication is not required to exploit this vulnerability. The specific flaw exists within the StorageNode service, which listens on TCP port 9075 by default. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-26156.
AI-Powered Analysis
Technical Analysis
CVE-2025-8610 is a critical remote code execution vulnerability affecting AOMEI Cyber Backup version 3.7.0. The flaw resides in the StorageNode service, which by default listens on TCP port 9075. The vulnerability is classified as CWE-306, indicating a missing authentication for a critical function. Specifically, the StorageNode service does not require any authentication before granting access to sensitive functionality, allowing an unauthenticated remote attacker to execute arbitrary code with SYSTEM-level privileges. This means an attacker can fully compromise the affected system, gaining complete control over the backup environment and potentially the underlying host. The vulnerability has a CVSS v3.0 base score of 9.8, reflecting its critical severity with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits have been observed in the wild yet, the ease of exploitation and severity make this a significant threat. The lack of authentication on a network-exposed service that handles backup operations poses a severe risk, as attackers could manipulate backup data, disrupt backup processes, or use the compromised system as a foothold for lateral movement within an organization’s network. Given that backup systems often have elevated privileges and access to critical data, exploitation could lead to data loss, ransomware deployment, or full system compromise.
Potential Impact
For European organizations, the impact of this vulnerability could be severe. Backup systems like AOMEI Cyber Backup are integral to data protection and disaster recovery strategies. Compromise of such a system could lead to unauthorized data access, data tampering, or deletion, undermining data integrity and availability. Attackers gaining SYSTEM-level access could deploy ransomware or other malware, potentially causing widespread operational disruption. Given the critical nature of backup infrastructure, exploitation could affect business continuity, regulatory compliance (e.g., GDPR), and result in significant financial and reputational damage. Organizations relying on AOMEI Cyber Backup for critical data protection are at risk of losing control over their backup environments, which could also facilitate further attacks on connected systems. The vulnerability’s network-exposed nature and lack of authentication mean it can be exploited remotely without user interaction, increasing the likelihood of automated scanning and exploitation attempts targeting European networks.
Mitigation Recommendations
Immediate mitigation steps include isolating the StorageNode service from untrusted networks by restricting access to TCP port 9075 using network segmentation and firewall rules. Organizations should implement strict network-level access controls, allowing only trusted management hosts to communicate with the backup server. Monitoring network traffic for unusual connections to port 9075 can help detect exploitation attempts. Since no patch is currently available, consider disabling or stopping the StorageNode service if feasible until a vendor fix is released. Employ host-based intrusion detection systems (HIDS) to monitor for suspicious process creation or privilege escalation indicative of exploitation. Regularly audit backup server configurations and logs for unauthorized access attempts. Additionally, maintain offline or immutable backups to ensure recovery capability in case of compromise. Once a patch is released by AOMEI, prioritize its deployment across all affected systems. Finally, incorporate this vulnerability into incident response plans and conduct tabletop exercises to prepare for potential exploitation scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2025-08-05T19:59:21.371Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68a5f8afad5a09ad0006e529
Added to database: 8/20/2025, 4:32:47 PM
Last enriched: 8/20/2025, 4:48:14 PM
Last updated: 8/22/2025, 12:34:56 AM
Views: 10
Related Threats
CVE-2025-43752: CWE-770 Allocation of Resources Without Limits or Throttling in Liferay Portal
MediumCVE-2025-43753: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
LowCVE-2025-51606: n/a
UnknownCVE-2025-43747: CWE-918 Server-Side Request Forgery (SSRF) in Liferay DXP
MediumCVE-2025-27714: CWE-434 in INFINITT Healthcare INFINITT PACS System Manager
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.