Learn about CVE-2020-36167, a critical vulnerability in Veritas Backup Exec allowing arbitrary code execution. Find out the impact, affected systems, and mitigation steps.
An issue was discovered in the server in Veritas Backup Exec through 16.2, 20.6 before hotfix 298543, and 21.1 before hotfix 657517. This vulnerability allows a low privileged user to execute arbitrary code as SYSTEM, potentially gaining administrator access.
Understanding CVE-2020-36167
This CVE identifies a critical vulnerability in Veritas Backup Exec that could lead to arbitrary code execution with high impact on confidentiality, integrity, and availability.
What is CVE-2020-36167?
The vulnerability in Veritas Backup Exec allows a low privileged user to load a malicious OpenSSL engine by creating a specific configuration file, leading to arbitrary code execution as SYSTEM.
The Impact of CVE-2020-36167
Technical Details of CVE-2020-36167
This section delves into the specifics of the vulnerability.
Vulnerability Description
The issue arises from the OpenSSL library loading process during Veritas Backup Exec startup, potentially allowing a user to gain administrator access.
Affected Systems and Versions
Exploitation Mechanism
A low privileged user can create a specific configuration file to load a malicious OpenSSL engine, leading to arbitrary code execution as SYSTEM.
Mitigation and Prevention
Protecting systems from CVE-2020-36167 is crucial to prevent unauthorized access and potential data breaches.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure that all systems running Veritas Backup Exec are updated with the latest hotfixes to mitigate the vulnerability.