Discover the critical CVE-2020-36160 affecting Veritas System Recovery before 21.2, allowing arbitrary code execution and potential system compromise. Learn about the impact, technical details, and mitigation steps.
Veritas System Recovery before 21.2 has a critical vulnerability that allows a low privileged user to execute arbitrary code as SYSTEM, potentially gaining administrator access.
Understanding CVE-2020-36160
This CVE describes a security issue in Veritas System Recovery that can lead to arbitrary code execution and potential system compromise.
What is CVE-2020-36160?
The vulnerability in Veritas System Recovery allows a low privileged user to load a malicious OpenSSL engine, leading to arbitrary code execution as SYSTEM during service startup.
The Impact of CVE-2020-36160
The impact of this vulnerability is critical, with a CVSS base score of 9.3. It can result in high confidentiality and integrity impact, allowing an attacker to gain administrator access and potentially compromise the entire system, especially on Active Directory domain controllers.
Technical Details of CVE-2020-36160
This section provides more technical insights into the vulnerability.
Vulnerability Description
The issue arises from Veritas System Recovery loading the OpenSSL library from a specific directory, allowing the user to create a malicious configuration file that triggers arbitrary code execution.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Protecting systems from CVE-2020-36160 is crucial to prevent potential exploitation.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates