Commvault Web Server has an unspecified vulnerability that can be exploited by a remote, authenticated attacker. According to the Commvault advisory: "Webservers can be compromised through bad actors creating and executing webshells." Fixed in version 11.36.46, 11.32.89, 11.28.141, and 11.20.217 for Windows and Linux platforms. This vulnerability was added to the CISA Known Exploited Vulnerabilities (KEV) Catalog on 2025-04-28.
References
Link | Resource |
---|---|
https://documentation.commvault.com/securityadvisories/CV_2025_03_1.html | Vendor Advisory |
https://www.bleepingcomputer.com/news/security/commvault-says-recent-breach-didnt-impact-customer-backup-data/ | Third Party Advisory |
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-3928 | Third Party Advisory US Government Resource |
https://www.cisa.gov/news-events/alerts/2025/05/22/advisory-update-cyber-threat-activity-targeting-commvaults-saas-cloud-application-metallic | Third Party Advisory US Government Resource |
https://www.commvault.com/blogs/customer-security-update | Vendor Advisory |
https://www.commvault.com/blogs/notice-security-advisory-update | Vendor Advisory |
https://www.commvault.com/blogs/security-advisory-march-7-2025 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
28 May 2025, 20:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cisa.gov/news-events/alerts/2025/05/22/advisory-update-cyber-threat-activity-targeting-commvaults-saas-cloud-application-metallic - Third Party Advisory, US Government Resource | |
References | () https://www.commvault.com/blogs/customer-security-update - Vendor Advisory |
27 May 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 May 2025, 20:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.bleepingcomputer.com/news/security/commvault-says-recent-breach-didnt-impact-customer-backup-data/ - Third Party Advisory |
05 May 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 May 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.commvault.com/blogs/security-advisory-march-7-2025 - Vendor Advisory | |
References | () https://www.commvault.com/blogs/notice-security-advisory-update - Vendor Advisory | |
References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-3928 - Third Party Advisory, US Government Resource |
02 May 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Commvault Web Server has an unspecified vulnerability that can be exploited by a remote, authenticated attacker. According to the Commvault advisory: "Webservers can be compromised through bad actors creating and executing webshells." Fixed in version 11.36.46, 11.32.89, 11.28.141, and 11.20.217 for Windows and Linux platforms. This vulnerability was added to the CISA Known Exploited Vulnerabilities (KEV) Catalog on 2025-04-28. | |
References |
|
29 Apr 2025, 19:48
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
First Time |
Commvault
Linux Microsoft windows Microsoft Commvault commvault Linux linux Kernel |
|
References | () https://documentation.commvault.com/securityadvisories/CV_2025_03_1.html - Vendor Advisory | |
CPE | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:commvault:commvault:*:*:*:*:*:*:*:* |
25 Apr 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-25 16:15
Updated : 2025-05-28 20:51
NVD link : CVE-2025-3928
Mitre link : CVE-2025-3928
JSON object : View
Products Affected
commvault
- commvault
microsoft
- windows
linux
- linux_kernel
CWE