Overview
CVE-2025-43596 is a significant cybersecurity vulnerability that impacts the MSP360 Backup version 8.0. This vulnerability allows a lower privileged user to execute commands with system-level privileges, thereby posing a severe threat to system integrity and data confidentiality. This issue arises due to insecure file system permissions, with the potential to lead to system compromise or data leakage if exploited. Affected entities include any organization or individual utilizing MSP360 Backup 8.0 for their data backup needs. Mitigation is possible through timely application of the vendor patch or employing WAF/IDS as a temporary solution.
Vulnerability Summary
CVE ID: CVE-2025-43596
Severity: High (7.8 CVSS Score)
Attack Vector: Local
Privileges Required: Low
User Interaction: Required
Impact: System compromise or data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
MSP360 Backup | 8.0
How the Exploit Works
The insecure file system permissions vulnerability (CVE-2025-43596) in MSP360 Backup 8.0 allows for privilege escalation by low privileged users. In the affected version, an attacker could craft a specific file with an arbitrary file backup target. Once this file is in place, the low privileged user could execute commands with elevated system-level privileges. This exploitation could lead to unauthorized access to sensitive data, system compromise or potentially further propagation within the system.
Conceptual Example Code
The following conceptual example demonstrates how a user could exploit this vulnerability. While it is not an exact replication of an exploit, it provides a sense of the actions a malicious actor might take:
# Assume low privilege user
$ whoami
low_priv_user
# Create a malicious crafted file
$ echo "echo 'Running command with system level privilege' > /root/proof.txt" > exploit.sh
# Set MSP360 Backup target to our crafted file
$ mspbackup --set-target="exploit.sh"
# Run backup process
$ mspbackup --run
# Verify execution of arbitrary command
$ cat /root/proof.txt
Running command with system level privilege
This example demonstrates the potential for a low-privileged user to execute arbitrary commands with system-level privileges. This capability can cause severe damage in a real-world scenario, emphasizing the importance of patching this vulnerability promptly.