Skip to main content

CVE-2025-8611: CWE-306: Missing Authentication for Critical Function in AOMEI Cyber Backup

Critical
VulnerabilityCVE-2025-8611cvecve-2025-8611cwe-306
Published: Wed Aug 20 2025 (08/20/2025, 16:26:21 UTC)
Source: CVE Database V5
Vendor/Project: AOMEI
Product: Cyber Backup

Description

AOMEI Cyber Backup Missing Authentication for Critical Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of AOMEI Cyber Backup. Authentication is not required to exploit this vulnerability. The specific flaw exists within the DaoService service, which listens on TCP port 9074 by default. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-26158.

AI-Powered Analysis

AILast updated: 08/20/2025, 16:47:58 UTC

Technical Analysis

CVE-2025-8611 is a critical remote code execution vulnerability affecting AOMEI Cyber Backup version 3.7.0. The root cause is a missing authentication mechanism in the DaoService component, which listens on TCP port 9074 by default. This service exposes critical functionality without requiring any form of authentication, allowing unauthenticated remote attackers to execute arbitrary code with SYSTEM-level privileges. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function), indicating that the affected function should have been protected by authentication but was not. Exploitation requires no user interaction and no prior privileges, making it trivially exploitable over the network. The attacker can leverage this flaw to gain full control over the affected system, potentially leading to complete compromise of backup infrastructure, data theft, destruction, or ransomware deployment. The CVSS v3.0 base score of 9.8 reflects the critical severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are currently known, the ease of exploitation and severity make this vulnerability a high priority for patching and mitigation.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the integrity and availability of backup systems, which are critical for data protection and disaster recovery. Successful exploitation could allow attackers to execute arbitrary code as SYSTEM, potentially leading to data theft, destruction of backup data, or use of the compromised system as a foothold for lateral movement within the network. This could disrupt business continuity, cause regulatory compliance violations (especially under GDPR due to potential data breaches), and result in financial and reputational damage. Organizations relying on AOMEI Cyber Backup 3.7.0 for protecting sensitive or critical data are particularly vulnerable. The lack of authentication means that attackers can scan for exposed TCP port 9074 and exploit the vulnerability remotely without any credentials, increasing the attack surface. Given the criticality of backup infrastructure in European enterprises, including sectors like finance, healthcare, and government, the impact could be severe if exploited.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting network access to TCP port 9074 using firewalls or network segmentation to limit exposure to trusted management networks only. 2. Disable or stop the DaoService if it is not required or if an immediate patch is not available. 3. Monitor network traffic for any suspicious connections to port 9074 and implement intrusion detection/prevention rules targeting this service. 4. Since no patch is currently available, coordinate with AOMEI for timely updates and apply patches as soon as they are released. 5. Employ application-layer authentication proxies or VPNs to enforce authentication before accessing the vulnerable service. 6. Conduct thorough audits of backup systems to detect any signs of compromise or unauthorized access. 7. Implement strict access controls and logging around backup infrastructure to detect anomalous activities. 8. Educate IT and security teams about this vulnerability and ensure rapid incident response capabilities are in place.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2025-08-05T19:59:34.272Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68a5f8afad5a09ad0006e52c

Added to database: 8/20/2025, 4:32:47 PM

Last enriched: 8/20/2025, 4:47:58 PM

Last updated: 8/21/2025, 2:00:23 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats