CVE-2025-63680

8.6 HIGH

📋 TL;DR

This vulnerability in Nero BackItUp allows arbitrary code execution when a user clicks on a crafted entry in the software's interface. Attackers can exploit a path parsing flaw combined with Windows ShellExecuteW behavior to run malicious scripts disguised as folders. It affects users of recent Nero BackItUp product lines from 2019 to 2025 and earlier versions.

💻 Affected Systems

Products:
  • Nero BackItUp
Versions: 2019 to 2025 and earlier versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability relies on Windows ShellExecuteW behavior and user interaction; no special configurations are needed for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining control over the user's machine, potentially leading to data theft, ransomware deployment, or lateral movement in a network.

🟠

Likely Case

Local privilege escalation or execution of arbitrary code in the context of the logged-in user, resulting in malware installation or data exfiltration.

🟢

If Mitigated

Limited impact if user awareness is high and software is restricted from accessing untrusted sources, but risk remains due to the nature of the flaw.

🌐 Internet-Facing: LOW, as exploitation typically requires local access or social engineering to trick users into clicking crafted entries, not direct internet exposure.
🏢 Internal Only: MEDIUM, because internal users could be targeted via shared drives or phishing, but it requires user interaction and specific conditions.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (clicking a crafted entry) and knowledge of the flaw, but proof-of-concept code is publicly available, making it easier for attackers to weaponize.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Specific version not provided in references; check vendor advisory for latest updates.

Vendor Advisory: Not provided in input; refer to Nero's official security updates.

Restart Required: Yes

Instructions:

1. Check for updates in Nero BackItUp via the software's update feature or Nero's website. 2. Download and install the latest patch from the vendor. 3. Restart the application or system as required to apply the fix.

🔧 Temporary Workarounds

Disable ShellExecuteW Fallback

windows

Modify Windows settings to restrict ShellExecuteW from executing scripts via PATHEXT fallback, reducing the risk of arbitrary code execution.

Not applicable; this requires registry or group policy changes and is not recommended without testing.

User Awareness Training

all

Educate users to avoid clicking on suspicious entries or folders in Nero BackItUp, especially from untrusted sources.

🧯 If You Can't Patch

  • Restrict user permissions to limit software access to trusted directories only.
  • Monitor for unusual process executions or file creations related to Nero BackItUp and investigate anomalies promptly.

🔍 How to Verify

Check if Vulnerable:

Check the version of Nero BackItUp installed; if it is within the affected range (2019-2025 or earlier), it is likely vulnerable. Use the version check command below.

Check Version:

In Nero BackItUp, go to Help > About or check the program properties in Windows to see the version number.

Verify Fix Applied:

After applying the patch, confirm the software version is updated beyond the vulnerable range and test by attempting to reproduce the exploit in a controlled environment.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process spawns from Nero BackItUp, especially .COM, .EXE, .BAT, or .CMD files executed via ShellExecuteW.
  • File creation events in trailing-dot folders with script basenames.

Network Indicators:

  • Outbound connections from Nero BackItUp to unknown IPs, potentially indicating data exfiltration or command-and-control activity.

SIEM Query:

Example: Process creation where parent process is 'Nero BackItUp' and command line includes .COM, .EXE, .BAT, or .CMD extensions.

🔗 References

📤 Share & Export