Deserialization Vulnerability in Veritas Enterprise Vault
CVE-2021-44679

9.8CRITICAL

Key Information:

Vendor
Veritas
Vendor
CVE Published:
6 December 2021

Summary

Veritas Enterprise Vault is susceptible to a deserialization vulnerability due to its inherent TCP remoting service behavior, which listens on randomly assigned .NET Remoting TCP ports during startup. This flaw allows a malicious attacker to exploit both the TCP and local IPC services on the Enterprise Vault Server. To mitigate this vulnerability, it is critical to adhere to proper server and firewall configurations as recommended in the vendor's security alert (VTS21-003). Further details can be found in the Zero Day Initiative advisory (ZDI-CAN-14074).

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2021-44679 : Deserialization Vulnerability in Veritas Enterprise Vault | SecurityVulnerability.io