Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-36160 : What You Need to Know

Discover the critical CVE-2020-36160 affecting Veritas System Recovery before 21.2, allowing arbitrary code execution and potential system compromise. Learn about the impact, technical details, and mitigation steps.

Veritas System Recovery before 21.2 has a critical vulnerability that allows a low privileged user to execute arbitrary code as SYSTEM, potentially gaining administrator access.

Understanding CVE-2020-36160

This CVE describes a security issue in Veritas System Recovery that can lead to arbitrary code execution and potential system compromise.

What is CVE-2020-36160?

The vulnerability in Veritas System Recovery allows a low privileged user to load a malicious OpenSSL engine, leading to arbitrary code execution as SYSTEM during service startup.

The Impact of CVE-2020-36160

The impact of this vulnerability is critical, with a CVSS base score of 9.3. It can result in high confidentiality and integrity impact, allowing an attacker to gain administrator access and potentially compromise the entire system, especially on Active Directory domain controllers.

Technical Details of CVE-2020-36160

This section provides more technical insights into the vulnerability.

Vulnerability Description

The issue arises from Veritas System Recovery loading the OpenSSL library from a specific directory, allowing the user to create a malicious configuration file that triggers arbitrary code execution.

Affected Systems and Versions

        Veritas System Recovery before version 21.2

Exploitation Mechanism

        Low privileged user creates a malicious configuration file in a specific directory, leading to arbitrary code execution as SYSTEM.

Mitigation and Prevention

Protecting systems from CVE-2020-36160 is crucial to prevent potential exploitation.

Immediate Steps to Take

        Update Veritas System Recovery to version 21.2 or newer to patch the vulnerability.
        Monitor system logs for any suspicious activities.

Long-Term Security Practices

        Implement the principle of least privilege to restrict user access.
        Regularly review and update security configurations.

Patching and Updates

        Regularly apply security patches and updates to all software components to address known vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now