Critical ASUSTOR Vulnerability Let Attackers Execute Malicious Code with Elevated Privileges

Critical ASUSTOR Vulnerability Let Attackers Execute Malicious Code with Elevated Privileges

Critical ASUSTOR Vulnerability Let Attackers Execute Malicious Code with Elevated Privileges

A critical security vulnerability has been discovered in ASUSTOR backup and synchronization software, allowing attackers to execute malicious code with elevated system privileges.

The flaw, tracked as CVE-2025-13051, affects two widely used ASUSTOR applications and poses a significant risk to users running outdated versions.

The DLL Hijacking Vulnerability

The vulnerability stems from a DLL hijacking weakness that occurs when ASUSTOR Backup Plan (ABP) and ASUSTOR EZSync (AES) services are installed in directories accessible to non-administrative users.

Attackers can exploit this flaw by replacing legitimate dynamic link library (DLL) files with malicious versions that share the same filename as those loaded by the service.

When the affected service restarts, the malicious DLL is automatically loaded and executed.

Field Details
CVE ID CVE-2025-13051
Severity Critical
CVSS 4.0 Score 9.3
Attack Vector Local
Affected Products ABP ≤2.0.7.9050, AES ≤1.0.6.8290

Under the LocalSystem account, granting attackers unauthorized code execution with the highest level of system privileges.

google

This type of attack can lead to complete system compromise, allowing threat actors to install malware, steal sensitive data, or establish constant backdoor access.

The bug affects ABP version 2.0.7.9050 and all older versions, and AES version 1.0.6.8290 and all earlier releases.

ASUSTOR has released security patches to address this critical flaw. Users should immediately upgrade to ABP version 2.0.7.10171 or higher, and to AES version 1.1.0.10312 or higher, to protect their systems from potential exploitation.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link