Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-6399 : Exploit Details and Defense Strategies

Discover the security flaw in Veritas NetBackup versions before 7.7.2 and NetBackup Appliance versions before 2.7.2 allowing unauthorized remote command execution. Learn how to mitigate the risk.

A vulnerability has been found in Veritas NetBackup versions prior to 7.7.2 and NetBackup Appliance versions prior to 2.7.2, allowing for the execution of privileged remote commands on both the NetBackup Server and Client.

Understanding CVE-2017-6399

This CVE identifies a security flaw in Veritas NetBackup and NetBackup Appliance versions.

What is CVE-2017-6399?

This vulnerability enables the execution of privileged remote commands on the NetBackup Server and Client, whether on the server itself or a connected client.

The Impact of CVE-2017-6399

The vulnerability poses a significant risk as it allows unauthorized remote command execution on affected systems, potentially leading to unauthorized access and control.

Technical Details of CVE-2017-6399

This section provides detailed technical information about the CVE.

Vulnerability Description

An issue in Veritas NetBackup versions before 7.7.2 and NetBackup Appliance versions before 2.7.2 allows for privileged remote command execution on both the server and connected clients.

Affected Systems and Versions

        Veritas NetBackup versions prior to 7.7.2
        NetBackup Appliance versions prior to 2.7.2

Exploitation Mechanism

The vulnerability can be exploited remotely to execute privileged commands on the NetBackup Server and Client, compromising the security of the systems.

Mitigation and Prevention

Protecting systems from CVE-2017-6399 requires immediate action and long-term security measures.

Immediate Steps to Take

        Update Veritas NetBackup to version 7.7.2 or later.
        Update NetBackup Appliance to version 2.7.2 or higher.
        Monitor and restrict network access to vulnerable systems.

Long-Term Security Practices

        Implement network segmentation to isolate critical systems.
        Regularly monitor and audit system logs for unusual activities.
        Educate users on safe computing practices to prevent social engineering attacks.

Patching and Updates

Regularly apply security patches and updates provided by Veritas to address known vulnerabilities and enhance system security.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now