Remote Code Execution Vulnerability in Veritas Enterprise Vault Before 15.2
CVE-2024-53909

9.8CRITICAL

Key Information:

Vendor
Veritas
Vendor
CVE Published:
24 November 2024

What is CVE-2024-53909?

CVE-2024-53909 is a remote code execution vulnerability found in Veritas Enterprise Vault versions prior to 15.2. Veritas Enterprise Vault is a software platform that enables organizations to manage and archive data, ensuring compliance and optimizing storage. This vulnerability arises from the unsafe deserialization of untrusted data received over a .NET Remoting TCP port, allowing remote attackers to execute arbitrary code on affected systems. If successfully exploited, this vulnerability can compromise the integrity and confidentiality of organizational data, leading to potential operational disruption and data loss.

Technical Details

The vulnerability specifically affects the server component of Veritas Enterprise Vault. The root cause is the handling of untrusted input which, when deserialized, allows an attacker to inject and execute malicious code. The use of .NET Remoting, a technology used for remote procedure calls, adds a layer of complexity, as it allows communication between different application domains. This backdoor created by the vulnerability permits unauthorized access to the functionalities of the server, highlighting the necessity for secure coding practices in remote interactions.

Potential impact of CVE-2024-53909

  1. Unauthorized Access: Exploiting this vulnerability could enable an attacker to gain unauthorized control over the affected server, leading to potential unauthorized modifications to data and configuration settings.

  2. Data Breach Risks: The ability to execute arbitrary code poses significant risks to sensitive data stored within the Veritas Enterprise Vault, potentially resulting in data theft or exposure of confidential information.

  3. Operational Disruption: Successful exploitation may lead to service outages or disruptions, affecting the organization's ability to access critical archived data and thus impacting overall operational efficiency and productivity.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.