Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9120: CWE-94 Improper Control of Generation of Code ('Code Injection') in OpenText™ Carbonite Safe Server Backup

0
High
VulnerabilityCVE-2025-9120cvecve-2025-9120cwe-94
Published: Tue Feb 24 2026 (02/24/2026, 00:03:08 UTC)
Source: CVE Database V5
Vendor/Project: OpenText™
Product: Carbonite Safe Server Backup

Description

CVE-2025-9120 is a high-severity code injection vulnerability in OpenText™ Carbonite Safe Server Backup versions up to 6. 8. 3. It stems from improper control over code generation, classified under CWE-94. The flaw can be exploited remotely via an open port without requiring authentication or user interaction, allowing attackers to execute arbitrary code with high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to organizations using affected versions. The vulnerability's CVSS 4. 0 score is 8. 6, reflecting its critical nature. Organizations relying on Carbonite Safe Server Backup should prioritize patching once updates become available and implement network-level controls to restrict access to the vulnerable service.

AI-Powered Analysis

AILast updated: 02/24/2026, 01:01:36 UTC

Technical Analysis

CVE-2025-9120 is a critical vulnerability identified in OpenText™ Carbonite Safe Server Backup, affecting versions through 6.8.3. The vulnerability is categorized as CWE-94, indicating improper control of code generation, commonly known as code injection. This flaw allows an attacker to inject and execute arbitrary code on the affected system by exploiting an open network port exposed by the backup software. The vulnerability does not require any authentication or user interaction, making it remotely exploitable by unauthenticated attackers. The CVSS 4.0 vector (AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates local attack vector but with low complexity, no privileges, no user interaction, and high impact on confidentiality, integrity, and availability. The vulnerability could allow attackers to compromise backup servers, potentially leading to data theft, data manipulation, or disruption of backup and recovery operations. Although no public exploits have been reported yet, the nature of the vulnerability and the critical role of backup systems in enterprise environments make it a significant threat. The vulnerability was reserved in August 2025 and published in February 2026, with no patches currently listed, emphasizing the need for immediate mitigation steps.

Potential Impact

The exploitation of CVE-2025-9120 could have severe consequences for organizations worldwide. Successful code injection could lead to full system compromise of backup servers, enabling attackers to access sensitive backup data, alter or delete backups, and disrupt disaster recovery processes. This can result in data loss, prolonged downtime, and potential ransomware attacks leveraging compromised backup infrastructure. The high impact on confidentiality, integrity, and availability threatens business continuity and regulatory compliance, especially for sectors relying heavily on data protection such as finance, healthcare, and government. The vulnerability's remote exploitability without authentication increases the attack surface, making it attractive for threat actors. Organizations with exposed backup servers on public or poorly segmented networks face elevated risks. Additionally, the compromise of backup systems could serve as a pivot point for further network intrusion and lateral movement within enterprise environments.

Mitigation Recommendations

Until an official patch is released, organizations should implement the following specific mitigations: 1) Restrict network access to Carbonite Safe Server Backup ports using firewalls or network segmentation to limit exposure to trusted hosts only. 2) Employ strict access control lists (ACLs) and VPNs to secure remote management interfaces. 3) Monitor network traffic and logs for unusual activity targeting backup server ports. 4) Disable or uninstall Carbonite Safe Server Backup on systems where it is not essential. 5) Conduct regular backups of backup server configurations and data to enable recovery if compromised. 6) Prepare incident response plans specifically addressing backup infrastructure compromise. 7) Stay alert for vendor advisories and apply patches immediately upon release. 8) Use application whitelisting and endpoint detection and response (EDR) tools to detect and block suspicious code execution on backup servers. These targeted actions go beyond generic advice by focusing on reducing the attack surface and enhancing detection specific to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
OpenText
Date Reserved
2025-08-18T18:06:33.953Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699cf533be58cf853bf604d1

Added to database: 2/24/2026, 12:47:47 AM

Last enriched: 2/24/2026, 1:01:36 AM

Last updated: 2/24/2026, 5:39:01 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats