Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://github.com/PotatoHamm/Nero-Productline-Vulnerability |
|
Mon, 12 Jan 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:nero:backitup:*:*:*:*:*:*:*:* |
Sat, 15 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Nero Nero backitup |
|
| Vendors & Products |
Microsoft
Microsoft windows Nero Nero backitup |
Fri, 14 Nov 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 | |
| Metrics |
cvssV3_1
|
Fri, 14 Nov 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nero BackItUp in the Nero Productline is vulnerable to a path parsing/UI rendering flaw (CWE-22) that, in combination with Windows ShellExecuteW fallback extension resolution, leads to arbitrary code execution when a user clicks a crafted entry. By creating a trailing-dot folder and placing a same-basename script, Nero BackItUp renders the file as a folder icon and then invokes ShellExecuteW, which executes the script via PATHEXT fallback (.COM/.EXE/.BAT/.CMD). The issue affects recent Nero BackItUp product lines (2019-2025 and earlier) and has been acknowledged by the vendor. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-14T19:21:27.874Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63680
Updated: 2025-11-14T19:20:40.686Z
Status : Analyzed
Published: 2025-11-14T19:16:01.360
Modified: 2026-01-12T14:56:54.810
Link: CVE-2025-63680
No data.
OpenCVE Enrichment
Updated: 2025-11-15T22:07:26Z