{"id":59356,"date":"2025-07-13T16:55:44","date_gmt":"2025-07-13T16:55:44","guid":{"rendered":""},"modified":"2025-10-21T17:37:23","modified_gmt":"2025-10-21T23:37:23","slug":"cve-2025-43596-insecure-file-system-permissions-vulnerability-in-msp360-backup-8-0","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-43596-insecure-file-system-permissions-vulnerability-in-msp360-backup-8-0\/","title":{"rendered":"<strong>CVE-2025-43596: Insecure File System Permissions Vulnerability in MSP360 Backup 8.0<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>CVE-2025-43596 is a significant cybersecurity vulnerability that impacts the MSP360 Backup version 8.0. This vulnerability allows a lower privileged user to execute commands with system-level privileges, thereby posing a severe threat to system integrity and data confidentiality. This issue arises due to insecure file system permissions, with the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-7419-critical-vulnerability-discovered-in-tenda-o3v2-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"68751\">potential to lead to system<\/a> compromise or data leakage if exploited. Affected entities include any organization or individual utilizing MSP360 Backup 8.0 for their data backup needs. Mitigation is possible through timely application of the vendor patch or employing WAF\/IDS as a temporary solution.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-43596<br \/>\nSeverity: High (7.8 CVSS Score)<br \/>\nAttack Vector: Local<br \/>\nPrivileges Required: Low<br \/>\nUser Interaction: Required<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-8040-memory-safety-bugs-causing-potential-system-compromise-in-firefox-and-thunderbird\/\"  data-wpil-monitor-id=\"71238\">System compromise<\/a> or data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-3726798699\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>MSP360 Backup | 8.0<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The insecure <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-28946-php-remote-file-inclusion-vulnerability-in-bzotheme-printxtore\/\"  data-wpil-monitor-id=\"66159\">file system permissions vulnerability<\/a> (CVE-2025-43596) in MSP360 Backup 8.0 allows for privilege escalation by low privileged users. In the affected version, an attacker could craft a specific <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-40738-critical-arbitrary-file-write-vulnerability-in-sinec-nms\/\"  data-wpil-monitor-id=\"66565\">file with an arbitrary<\/a> file backup target. Once this file is in place, the low <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-49747-unauthorized-privilege-elevation-in-azure-machine-learning\/\"  data-wpil-monitor-id=\"68750\">privileged user could execute commands with elevated<\/a> system-level privileges. This exploitation could <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-41668-critical-file-replacement-leading-to-unauthorized-access\/\"  data-wpil-monitor-id=\"66312\">lead to unauthorized<\/a> access to sensitive data, system compromise or potentially further propagation within the system.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-4235178623\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>The following conceptual example demonstrates how a <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-50738-memos-application-vulnerability-allows-for-unauthorized-user-information-disclosure\/\"  data-wpil-monitor-id=\"71239\">user could exploit this vulnerability<\/a>. While it is not an exact replication of an exploit, it provides a sense of the actions a malicious actor might take:<\/p>\n<pre><code class=\"\" data-line=\"\"># Assume low privilege user\n$ whoami\nlow_priv_user\n# Create a malicious crafted file\n$ echo &quot;echo &#039;Running command with system level privilege&#039; &gt; \/root\/proof.txt&quot; &gt; exploit.sh\n# Set MSP360 Backup target to our crafted file\n$ mspbackup --set-target=&quot;exploit.sh&quot;\n# Run backup process\n$ mspbackup --run\n# Verify execution of arbitrary command\n$ cat \/root\/proof.txt\nRunning command with system level privilege<\/code><\/pre>\n<p>This example demonstrates the potential for a low-privileged user to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-54416-arbitrary-command-execution-vulnerability-in-tj-actions-branch-names-github-action\/\"  data-wpil-monitor-id=\"71240\">execute arbitrary commands<\/a> with system-level privileges. This capability can cause severe damage in a real-world scenario, emphasizing the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-10057-remote-code-execution-vulnerability-in-wp-import-ultimate-csv-xml-importer-for-wordpress-plugin\/\"  data-wpil-monitor-id=\"90921\">importance of patching this vulnerability<\/a> promptly.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview CVE-2025-43596 is a significant cybersecurity vulnerability that impacts the MSP360 Backup version 8.0. This vulnerability allows a lower privileged user to execute commands with system-level privileges, thereby posing a severe threat to system integrity and data confidentiality. This issue arises due to insecure file system permissions, with the potential to lead to system compromise [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[76],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-59356","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-privilege-escalation"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=59356"}],"version-history":[{"count":6,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59356\/revisions"}],"predecessor-version":[{"id":83866,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59356\/revisions\/83866"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=59356"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=59356"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=59356"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=59356"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=59356"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=59356"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=59356"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=59356"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=59356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}