Plattform
other
Komponente
ubr-ubr-restore
Behoben in
6.0.1.0
6.0.1.0
6.0.1.0
CVE-2025-41757 describes a critical vulnerability in UBR (ubr-restore), a backup and restore utility. This flaw allows a low-privileged remote attacker to leverage the backup restore functionality, which operates with elevated privileges, to create or overwrite arbitrary files on the system. Affected versions include those from 0.0.0 through 6.0.1.0; a fix is available in version 6.0.1.0.
The impact of this vulnerability is severe. An attacker can exploit it to gain arbitrary code execution by overwriting critical system files or binaries. This could lead to complete system compromise, including data theft, denial of service, and the installation of persistent malware. The ability to write files anywhere on the system significantly expands the attack surface and increases the potential for lateral movement within a network. The elevated privileges required for the backup restore process amplify the risk, as the attacker doesn't need to initially compromise a low-privileged account.
CVE-2025-41757 was publicly disclosed on 2026-03-09. The vulnerability's severity is rated HIGH with a CVSS score of 8.8. Currently, there are no publicly available proof-of-concept exploits. It is not listed on the CISA KEV catalog at the time of this writing, but its high severity warrants close monitoring for potential exploitation.
Organizations utilizing UBR (ubr-restore) for backup and recovery operations are at risk, particularly those with legacy configurations or limited access controls on the backup restore functionality. Systems where UBR (ubr-restore) is exposed to untrusted networks are also at increased risk.
disclosure
Exploit-Status
EPSS
0.08% (23% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2025-41757 is to immediately upgrade UBR (ubr-restore) to version 6.0.1.0 or later. If upgrading is not immediately feasible, consider restricting access to the backup restore functionality to trusted users only. Implement strict file access controls to limit the locations where files can be written. Monitoring backup and restore operations for unusual activity can also help detect potential exploitation attempts. After upgrading, verify the integrity of the system by checking file permissions and system logs for any unauthorized modifications.
Actualice UBR a la versión 6.0.1.0 o posterior. Esto corrige la vulnerabilidad de escritura arbitraria al validar correctamente el contenido del archivo de copia de seguridad antes de restaurarlo.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-41757 is a HIGH severity vulnerability in UBR (ubr-restore) allowing remote attackers to create or overwrite files, potentially leading to system compromise.
Yes, if you are using UBR (ubr-restore) versions 0.0.0 through 6.0.1.0, you are potentially affected by this vulnerability.
Upgrade to version 6.0.1.0 or later to remediate the vulnerability. Implement access controls as an interim measure.
There is currently no confirmed evidence of active exploitation, but the vulnerability's nature makes it a likely target.
Refer to the official UBR (ubr-restore) documentation and security advisories for the most up-to-date information.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.