Skip to main content

CVE-2025-8612: CWE-59: Improper Link Resolution Before File Access ('Link Following') in AOMEI Backupper Workstation

High
VulnerabilityCVE-2025-8612cvecve-2025-8612cwe-59
Published: Wed Aug 20 2025 (08/20/2025, 16:26:37 UTC)
Source: CVE Database V5
Vendor/Project: AOMEI
Product: Backupper Workstation

Description

AOMEI Backupper Workstation Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of AOMEI Backupper Workstation. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. User interaction on the part of an administrator is needed additionally. The specific flaw exists within the restore functionality. By creating a junction, an attacker can abuse the service to create arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-27059.

AI-Powered Analysis

AILast updated: 08/20/2025, 16:47:47 UTC

Technical Analysis

CVE-2025-8612 is a local privilege escalation vulnerability affecting AOMEI Backupper Workstation version 4.7.2. The vulnerability stems from improper link resolution before file access, categorized under CWE-59 ('Link Following'). Specifically, the flaw exists in the restore functionality of the software. An attacker who already has the ability to execute low-privileged code on the target system can exploit this vulnerability by creating a junction (a type of symbolic link in Windows) that the backup service follows improperly. This allows the attacker to manipulate the service into creating arbitrary files in locations that should be protected. Exploiting this flaw enables escalation of privileges from a low-privileged user to SYSTEM-level privileges, which is the highest level of privilege on Windows systems. However, exploitation requires user interaction by an administrator, meaning an admin must initiate or approve some action during the attack process. The vulnerability was identified and assigned by the Zero Day Initiative (ZDI) as ZDI-CAN-27059 and has a CVSS v3.0 score of 7.3, indicating a high severity level. The attack vector is local (AV:L), requires low attack complexity (AC:L), privileges (PR:L), and user interaction (UI:R). The impact on confidentiality, integrity, and availability is high, as the attacker can execute arbitrary code with SYSTEM privileges, potentially leading to full system compromise. No known exploits are currently reported in the wild, and no patch links are provided yet, indicating that organizations using this software should be vigilant and prepare to apply updates once available.

Potential Impact

For European organizations using AOMEI Backupper Workstation 4.7.2, this vulnerability poses a significant risk. Since the flaw allows local privilege escalation to SYSTEM level, an attacker who gains initial low-level access—such as through phishing, malware, or insider threats—can leverage this vulnerability to gain full control over affected systems. This can lead to unauthorized access to sensitive data, disruption of backup and restore operations, and potential deployment of ransomware or other malicious payloads. The requirement for administrator interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments where administrators frequently interact with backup software. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and critical infrastructure, could face severe compliance and operational impacts if exploited. Additionally, the backup software’s role in data recovery means that compromise could undermine disaster recovery capabilities, increasing downtime and recovery costs.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Immediately audit and restrict local user permissions to minimize the number of users with low-level code execution capabilities. 2) Limit administrative user interactions with backup software to trusted personnel and enforce strict operational procedures to prevent inadvertent exploitation. 3) Monitor for suspicious creation of junctions or symbolic links on systems running AOMEI Backupper Workstation, as this is a key exploitation vector. 4) Employ application whitelisting and endpoint detection and response (EDR) tools to detect unusual file creation or privilege escalation attempts. 5) Isolate backup servers and workstations from general user environments to reduce attack surface. 6) Stay alert for official patches or updates from AOMEI and apply them promptly once released. 7) Conduct regular security awareness training for administrators to recognize and avoid social engineering attempts that could trigger the required user interaction. 8) Consider alternative backup solutions with a stronger security posture if patching is delayed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2025-08-05T19:59:45.095Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68a5f8afad5a09ad0006e52f

Added to database: 8/20/2025, 4:32:47 PM

Last enriched: 8/20/2025, 4:47:47 PM

Last updated: 8/21/2025, 3:00:24 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats