Arbitrary Code Execution Vulnerability in Veritas Resiliency Platform
CVE-2020-36168
9.3CRITICAL
Summary
A vulnerability in Veritas Resiliency Platform versions 3.4 and 3.5 arises due to improper handling of the OpenSSL library on Windows systems. When the Managed Host addon starts the service, it attempts to load a configuration file (openssl.cnf) which may be non-existent. This oversight allows a low privileged user to create the openssl.cnf file in a default directory, potentially leading to the execution of malicious code as SYSTEM when the service initializes. Consequently, this grants the attacker elevated access, compromising the integrity of the system and exposing sensitive data.
References
CVSS V3.1
Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved