Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-36167 : Vulnerability Insights and Analysis

Learn about CVE-2020-36167, a critical vulnerability in Veritas Backup Exec allowing arbitrary code execution. Find out the impact, affected systems, and mitigation steps.

An issue was discovered in the server in Veritas Backup Exec through 16.2, 20.6 before hotfix 298543, and 21.1 before hotfix 657517. This vulnerability allows a low privileged user to execute arbitrary code as SYSTEM, potentially gaining administrator access.

Understanding CVE-2020-36167

This CVE identifies a critical vulnerability in Veritas Backup Exec that could lead to arbitrary code execution with high impact on confidentiality, integrity, and availability.

What is CVE-2020-36167?

The vulnerability in Veritas Backup Exec allows a low privileged user to load a malicious OpenSSL engine by creating a specific configuration file, leading to arbitrary code execution as SYSTEM.

The Impact of CVE-2020-36167

        Attack Complexity: Low
        Attack Vector: Local
        Privileges Required: None
        Scope: Changed
        User Interaction: None
        CVSS Base Score: 9.3 (Critical)
        Confidentiality Impact: High
        Integrity Impact: High
        Availability Impact: High

Technical Details of CVE-2020-36167

This section delves into the specifics of the vulnerability.

Vulnerability Description

The issue arises from the OpenSSL library loading process during Veritas Backup Exec startup, potentially allowing a user to gain administrator access.

Affected Systems and Versions

        Veritas Backup Exec through 16.2
        Veritas Backup Exec 20.6 before hotfix 298543
        Veritas Backup Exec 21.1 before hotfix 657517

Exploitation Mechanism

A low privileged user can create a specific configuration file to load a malicious OpenSSL engine, leading to arbitrary code execution as SYSTEM.

Mitigation and Prevention

Protecting systems from CVE-2020-36167 is crucial to prevent unauthorized access and potential data breaches.

Immediate Steps to Take

        Apply the necessary hotfixes provided by Veritas to address the vulnerability.
        Monitor system logs for any suspicious activities.

Long-Term Security Practices

        Regularly update and patch Veritas Backup Exec to ensure the latest security fixes are in place.
        Implement the principle of least privilege to restrict user access.

Patching and Updates

Ensure that all systems running Veritas Backup Exec are updated with the latest hotfixes to mitigate the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now