CVE-2025-10643

9.1 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to bypass authentication in Wondershare Repairit without requiring credentials. Attackers can exploit incorrect permission assignments in storage account tokens to gain unauthorized access. All users running vulnerable versions of Wondershare Repairit are affected.

💻 Affected Systems

Products:
  • Wondershare Repairit
Versions: Specific versions not detailed in advisory, but pre-patch versions are vulnerable
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects standard installations; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to access, modify, or delete all files processed by Repairit, potentially leading to data theft, ransomware deployment, or system takeover.

🟠

Likely Case

Unauthorized access to sensitive files being repaired, potentially exposing personal or business data, with possible file corruption or deletion.

🟢

If Mitigated

Limited impact if system is isolated, has strict network controls, and files being processed contain no sensitive information.

🌐 Internet-Facing: HIGH - Remote attackers can exploit without authentication, making internet-exposed instances immediate targets.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit, but requires some network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

ZDI advisory suggests straightforward exploitation; CVSS 9.1 indicates high exploitability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Wondershare official advisory for specific patched version

Vendor Advisory: https://www.wondershare.com/security-advisory/

Restart Required: Yes

Instructions:

1. Open Wondershare Repairit
2. Go to Help > Check for Updates
3. Install latest available update
4. Restart application and system

🔧 Temporary Workarounds

Network Isolation

windows

Block inbound network access to Repairit application

Windows Firewall: New-InboundFirewallRule -DisplayName 'Block Repairit' -Program 'C:\Program Files\Wondershare\Repairit\Repairit.exe' -Action Block

Disable Network Features

all

Turn off any network/cloud features in Repairit settings

🧯 If You Can't Patch

  • Discontinue use of Wondershare Repairit until patched
  • Use alternative file repair software with proper security controls

🔍 How to Verify

Check if Vulnerable:

Check if running unpatched version of Wondershare Repairit; verify if authentication can be bypassed via network requests

Check Version:

Windows: wmic product where name='Wondershare Repairit' get version

Verify Fix Applied:

Confirm latest version is installed and test authentication bypass attempts fail

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication events
  • Failed login attempts followed by successful access
  • Access from unexpected IP addresses

Network Indicators:

  • Unauthenticated API calls to Repairit endpoints
  • Unexpected outbound connections from Repairit

SIEM Query:

source='*repairit*' AND (event_type='auth_failure' OR event_type='auth_success' FROM unknown_ip)

🔗 References

📤 Share & Export