Unauthorized Access Vulnerability in Veritas Backup Exec
CVE-2021-27878

8.8HIGH

Key Information:

Vendor
Veritas
Vendor
CVE Published:
1 March 2021

Badges

💰 Ransomware👾 Exploit Exists🦅 CISA Reported

Summary

A vulnerability in Veritas Backup Exec allows an attacker to bypass authentication due to a weakness in the SHA Authentication scheme. This flaw permits unauthorized access via a secured TLS communication channel. Once exploited, attackers can execute data management protocol commands on the connection, potentially allowing them to run arbitrary commands with system privileges. This oversight highlights the importance of securing authentication mechanisms to prevent unauthorized system access.

CISA Reported

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited and is known by the CISA as enabling ransomware campaigns.

The CISA's recommendation is: Apply updates per vendor instructions.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 💰

    Used in Ransomware

  • 👾

    Exploit known to exist

  • 🦅

    CISA Reported

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2021-27878 : Unauthorized Access Vulnerability in Veritas Backup Exec | SecurityVulnerability.io