Deserialization Vulnerability in Veritas Enterprise Vault TCP Services
CVE-2021-44680

9.8CRITICAL

Key Information:

Vendor
Veritas
Vendor
CVE Published:
6 December 2021

Summary

A vulnerability has been identified in Veritas Enterprise Vault through version 14.1.2, where deserialization behavior in the .NET Remoting TCP services can be exploited. This issue arises when various services listen on random TCP ports upon application startup, rendering them susceptible to commands from malicious client applications. Attackers can exploit both TCP remoting services and local IPC services, potentially leading to unwanted access or control over the Enterprise Vault Server. Mitigation strategies include proper server and firewall configurations, as outlined by the vendor's security advisory.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.