CVE-2021-27876

Published Mar 1, 2021

Last updated 2 years ago

Overview

Description
An issue was discovered in Veritas Backup Exec before 21.2. The communication between a client and an Agent requires successful authentication, which is typically completed over a secure TLS communication. However, due to a vulnerability in the SHA Authentication scheme, an attacker is able to gain unauthorized access and complete the authentication process. Subsequently, the client can execute data management protocol commands on the authenticated connection. By using crafted input parameters in one of these commands, an attacker can access an arbitrary file on the system using System privileges.
Source
cve@mitre.org
NVD status
Analyzed

Social media

Hype score
Not currently trending

Risk scores

CVSS 3.1

Type
Primary
Base score
8.1
Impact score
5.2
Exploitability score
2.8
Vector string
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Severity
HIGH

CVSS 2.0

Type
Primary
Base score
7.5
Impact score
7.8
Exploitability score
8
Vector string
AV:N/AC:L/Au:S/C:C/I:P/A:N

Known exploits

Data from CISA

Vulnerability name
Veritas Backup Exec Agent File Access Vulnerability
Exploit added on
Apr 7, 2023
Exploit action due
Apr 28, 2023
Required action
Apply updates per vendor instructions.

Weaknesses

nvd@nist.gov
CWE-287

Configurations