Multiple vulnerabilities in Veritas Backup Exec



Published: 2021-03-03 | Updated: 2023-04-05
Risk Critical
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2021-27876
CVE-2021-27877
CVE-2021-27878
CWE-ID CWE-287
Exploitation vector Network
Public exploit Vulnerability #1 is being exploited in the wild.
Vulnerability #2 is being exploited in the wild.
Vulnerability #3 is being exploited in the wild.
Vulnerable software
Subscribe
Backup Exec
Client/Desktop applications / Multimedia software

Vendor Veritas Technologies

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Improper Authentication

EUVDB-ID: #VU74470

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:H/RL:O/RC:C]

CVE-ID: CVE-2021-27876

CWE-ID: CWE-287 - Improper Authentication

Exploit availability: Yes

Description

The vulnerability allows a remote user to compromise the affected system.

The vulnerability exists due to an error in SHA Authentication scheme. A remote user can use specially crafted input parameters on one of the data management protocol commands to access an arbitrary file on the system using System privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Backup Exec: 16 FP1 (16.0.1142.1327) - 21.1

External links

http://www.veritas.com/content/support/en_US/security/VTS21-001#issue2


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

2) Improper Authentication

EUVDB-ID: #VU74471

Risk: Critical

CVSSv3.1: 7.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:H/RL:O/RC:C]

CVE-ID: CVE-2021-27877

CWE-ID: CWE-287 - Improper Authentication

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to an usage of obsolete however not disabled SHA authentication scheme. A remote non-authenticated attacker can use the SHA authentication scheme to gain unauthorized access to the BE Agent and execute privileged commands on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Backup Exec: 16 FP1 (16.0.1142.1327) - 21.1

External links

http://www.veritas.com/content/support/en_US/security/VTS21-001


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

3) Improper Authentication

EUVDB-ID: #VU74472

Risk: High

CVSSv3.1: 8.4 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C]

CVE-ID: CVE-2021-27878

CWE-ID: CWE-287 - Improper Authentication

Exploit availability: Yes

Description

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to an error in the SHA Authentication scheme. A remote user can use one of the data management protocol commands to execute an arbitrary command on the system using system privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Backup Exec: 16 FP1 (16.0.1142.1327) - 21.1

External links

http://www.veritas.com/content/support/en_US/security/VTS21-001


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.



###SIDEBAR###