Very High
CVE-2023-26258
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2023-26258
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Arcserve UDP through 9.0.6034 allows authentication bypass. The method getVersionInfo at WebServiceImpl/services/FlashServiceImpl leaks the AuthUUID token. This token can be used at /WebServiceImpl/services/VirtualStandbyServiceImpl to obtain a valid session. This session can be used to execute any task as administrator.
Add Assessment
Ratings
-
Attacker ValueVery High
-
ExploitabilityVery High
Technical Analysis
Remote Code Execution in ArcServe UDP Backup
A critical authentication bypass exists in ArcServe UDP Backup that affects versions 7.0 to 9.0.
By interacting with the service manipulating SOAP requests, it is possible to retrieve first details about the system including OS version, hostname, domain and administrator account name.
By forging a valid admin session with the discovered AuthUUID – ArcServe has an option to retrieve the admin password using the getLocalHostAsTrust method and request that from the ArcServe application.
The ArcServe application will return the value of the encrypted password that can be decrypted using the scripts provided by the authors of this vulnerability ( and in the reference link of this submission).
Would you also like to delete your Exploited in the Wild Report?
Delete Assessment Only Delete Assessment and Exploited in the Wild ReportCVSS V3 Severity and Metrics
General Information
Vendors
- arcserve
Products
- udp
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: