9
CVSSv2

CVE-2021-27878

Published: 01/03/2021 Updated: 27/09/2022
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

An issue exists in Veritas Backup Exec prior to 21.2. The communication between a client and an Agent requires successful authentication, which is typically completed over a secure TLS communication. However, due to a vulnerability in the SHA Authentication scheme, an attacker is able to gain unauthorized access and complete the authentication process. Subsequently, the client can execute data management protocol commands on the authenticated connection. The attacker could use one of these commands to execute an arbitrary command on the system using system privileges.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

veritas backup exec

Github Repositories

FIIT STU 2023/2024 BIT - Project - Malware Analysis and Replication

BIT - Malware Analysis and Replication of Partial Windows File Less Malware The project focused on malware analysis on real partial Windows File Less Malware implemented in PowerShell using many evasion techniques This part of the project represents a small replication of this malware using some of the techniques used in the real Malware All Anti-Malware and Anti-Virus produc