CVE-2023-43896
📋 TL;DR
A buffer overflow vulnerability in Macrium Reflect backup software allows attackers to escalate privileges or execute arbitrary code. This affects users running Macrium Reflect 8.1.7544 and earlier versions on Windows systems. Successful exploitation could lead to complete system compromise.
💻 Affected Systems
- Macrium Reflect
📦 What is this software?
Reflect by Macrium
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with SYSTEM/root privileges, enabling installation of persistent malware, data theft, or ransomware deployment.
Likely Case
Local privilege escalation allowing attackers to bypass security controls and gain administrative access to the system.
If Mitigated
Limited impact if proper endpoint protection, application whitelisting, and least privilege principles are enforced.
🎯 Exploit Status
Exploitation requires local access to the system. Public technical details and proof-of-concept code are available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 8.1.7545 and later
Vendor Advisory: https://knowledgebase.macrium.com/display/KNOW80/CVE-2023-43896+Advisory
Restart Required: Yes
Instructions:
1. Download latest Macrium Reflect from official website. 2. Run installer. 3. Follow installation prompts. 4. Restart system when prompted.
🔧 Temporary Workarounds
Uninstall Macrium Reflect
windowsRemove vulnerable software entirely if not needed
Control Panel > Programs > Uninstall a program > Select Macrium Reflect > Uninstall
Restrict driver loading
windowsUse Windows security policies to restrict loading of vulnerable driver
Use Group Policy: Computer Configuration > Windows Settings > Security Settings > System Services > Configure driver start type
🧯 If You Can't Patch
- Implement application control/whitelisting to prevent execution of unauthorized binaries
- Enforce least privilege principles and remove local administrator rights from standard users
🔍 How to Verify
Check if Vulnerable:
Check Macrium Reflect version in Help > About or Programs and Features
Check Version:
wmic product where name="Macrium Reflect" get version
Verify Fix Applied:
Verify version is 8.1.7545 or later in Help > About
📡 Detection & Monitoring
Log Indicators:
- Unusual process creation from Macrium Reflect components
- Driver loading events for Macrium drivers
- Privilege escalation attempts
Network Indicators:
- Outbound connections from Macrium processes to suspicious destinations
SIEM Query:
Process Creation where Image contains "reflect" OR Driver Load where DriverName contains "macrium"
🔗 References
- http://macrium.com
- https://knowledgebase.macrium.com/display/KNOW80/CVE-2023-43896+Advisory
- https://northwave-cybersecurity.com/vulnerability-notice/macrium-reflect-driver-out-of-bounds-write
- http://macrium.com
- https://knowledgebase.macrium.com/display/KNOW80/CVE-2023-43896+Advisory
- https://northwave-cybersecurity.com/vulnerability-notice/macrium-reflect-driver-out-of-bounds-write