Deserialization Vulnerability in Veritas Enterprise Vault
CVE-2021-44681
9.8CRITICAL
Summary
A significant deserialization vulnerability has been identified in Veritas Enterprise Vault versions through 14.1.2. This issue arises during the startup process, where multiple services initiated by the application listen on random .NET Remoting TCP ports for commands from client applications. The inherent deserialization behavior of the .NET Remoting service allows a malicious attacker to exploit both TCP remoting and local IPC services on the Enterprise Vault Server. Proper server and firewall configuration as per the vendor's security alert is crucial for mitigation against this vulnerability.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved