An issue was discovered in Veritas Backup Exec before 21.2. It supports multiple authentication schemes: SHA authentication is one of these. This authentication scheme is no longer used in current versions of the product, but hadn't yet been disabled. An attacker could remotely exploit this scheme to gain unauthorized access to an Agent and execute privileged commands.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/168506/Veritas-Backup-Exec-Agent-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/168506/Veritas-Backup-Exec-Agent-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://www.veritas.com/content/support/en_US/security/VTS21-001#issue1 | Vendor Advisory |
https://www.veritas.com/content/support/en_US/security/VTS21-001#issue1 | Vendor Advisory |
Configurations
History
07 Mar 2025, 14:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.veritas.com/content/support/en_US/security/VTS21-001#issue1 - Vendor Advisory | |
References | () http://packetstormsecurity.com/files/168506/Veritas-Backup-Exec-Agent-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
CWE | NVD-CWE-noinfo |
Information
Published : 2021-03-01 22:15
Updated : 2025-03-07 14:57
NVD link : CVE-2021-27877
Mitre link : CVE-2021-27877
JSON object : View
Products Affected
veritas
- backup_exec
CWE