Discover the critical vulnerability in Veritas Enterprise Vault through version 14.0 allowing arbitrary code execution. Learn how to mitigate and prevent potential system compromise.
An issue was discovered in Veritas Enterprise Vault through 14.0 that could allow a low privileged user to execute arbitrary code as SYSTEM, leading to potential administrator access on the system.
Understanding CVE-2020-36164
This CVE involves a vulnerability in Veritas Enterprise Vault that could result in arbitrary code execution.
What is CVE-2020-36164?
The vulnerability allows a low privileged user to create a malicious OpenSSL engine configuration file, leading to arbitrary code execution as SYSTEM during service startup.
The Impact of CVE-2020-36164
Technical Details of CVE-2020-36164
This section provides more technical insights into the vulnerability.
Vulnerability Description
The OpenSSL library in Veritas Enterprise Vault attempts to load a non-existent openssl.cnf configuration file, allowing a low privileged user to exploit this behavior.
Affected Systems and Versions
Exploitation Mechanism
A low privileged user can create a malicious openssl.cnf configuration file in specific directories, triggering arbitrary code execution as SYSTEM.
Mitigation and Prevention
Protect your systems from this vulnerability with the following steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates