Discover the critical CVE-2020-36166 affecting Veritas InfoScale on Windows. Learn about the impact, affected systems, and mitigation steps to secure your environment.
An issue was discovered in Veritas InfoScale 7.x through 7.4.2 on Windows, Storage Foundation through 6.1 on Windows, Storage Foundation HA through 6.1 on Windows, and InfoScale Operations Manager (aka VIOM) Windows Management Server 7.x through 7.4.2. This vulnerability allows a low privileged user to execute arbitrary code as SYSTEM, potentially leading to administrator access on the system.
Understanding CVE-2020-36166
This CVE identifies a critical vulnerability in Veritas products on Windows systems that could result in arbitrary code execution.
What is CVE-2020-36166?
The vulnerability arises from the loading of the OpenSSL library from a specific path, allowing a user to create a malicious configuration file that leads to code execution as SYSTEM.
The Impact of CVE-2020-36166
The impact of this vulnerability is severe, with a CVSS base score of 9.3 (Critical). It can result in high confidentiality, integrity, and availability impacts, granting an attacker administrator access.
Technical Details of CVE-2020-36166
This section delves into the technical aspects of the vulnerability.
Vulnerability Description
The issue stems from the loading of the OpenSSL library from a predictable path, enabling a user to create a malicious configuration file for arbitrary code execution.
Affected Systems and Versions
Exploitation Mechanism
By creating a specific configuration file in the OpenSSL library path, a low privileged user can execute arbitrary code as SYSTEM, gaining administrator access.
Mitigation and Prevention
Protecting systems from CVE-2020-36166 requires immediate actions and long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Regularly check for security updates from Veritas and apply them to ensure system protection.