Deserialization Vulnerability in Veritas Enterprise Vault
CVE-2021-44681

9.8CRITICAL

Key Information:

Vendor
Veritas
Vendor
CVE Published:
6 December 2021

Summary

A significant deserialization vulnerability has been identified in Veritas Enterprise Vault versions through 14.1.2. This issue arises during the startup process, where multiple services initiated by the application listen on random .NET Remoting TCP ports for commands from client applications. The inherent deserialization behavior of the .NET Remoting service allows a malicious attacker to exploit both TCP remoting and local IPC services on the Enterprise Vault Server. Proper server and firewall configuration as per the vendor's security alert is crucial for mitigation against this vulnerability.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2021-44681 : Deserialization Vulnerability in Veritas Enterprise Vault | SecurityVulnerability.io