CVE-2025-32991

N2WS · Backup & Recovery

A two-step attack targeting the RESTful API in N2WS Backup & Recovery enables remote code execution. This critical flaw is resolved in version 4.4.0.

Executive summary

N2WS Backup & Recovery is susceptible to a critical remote code execution vulnerability via its RESTful API, allowing attackers to compromise backup infrastructure.

Vulnerability

The vulnerability involves a multi-stage exploit chain targeting the application's RESTful API. By performing a "two-step" attack, an unauthenticated or low-privileged remote attacker can bypass security controls to execute arbitrary code on the underlying server.

Business impact

The impact of Remote Code Execution (RCE) on a backup and recovery platform is catastrophic. An attacker could delete backups, exfiltrate sensitive data, or deploy ransomware across the recovery environment, effectively neutralizing the organization's disaster recovery capabilities. The CVSS score of 9.0 justifies the critical severity due to the potential for total loss of system control.

Remediation

Immediate Action: Upgrade N2WS Backup & Recovery to version 4.4.0 or later immediately to close the vulnerable API endpoints.

Proactive Monitoring: Review API access logs for unusual patterns, specifically focusing on sequential requests to REST endpoints from unrecognized IP addresses.

Compensating Controls: Place the N2WS management interface behind a VPN or a Zero Trust Network Access (ZTNA) solution to limit API exposure to trusted internal users only.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Protecting backup infrastructure is a fundamental security requirement. Because this vulnerability allows for full system takeover via the API, the update to version 4.4.0 is mandatory. Security teams should prioritize this patch to ensure the integrity of their data protection and recovery environment.