Deserialization Vulnerability in Veritas Enterprise Vault Service
CVE-2021-44678

9.8CRITICAL

Key Information:

Vendor
Veritas
Vendor
CVE Published:
6 December 2021

Summary

A deserialization vulnerability exists in Veritas Enterprise Vault due to insecure handling of .NET Remoting TCP services. On startup, the application initiates several services that communicate over random ports, which can be exploited by attackers. These services can be targeted through both TCP remoting and local IPC communications on the Enterprise Vault Server. It is crucial for administrators to follow the vendor's security guidance to mitigate risks, including proper configuration of firewalls and service settings as outlined in Veritas's security alert.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.