← Back to CVEs
CVE-2021-27876
HIGHCISA KEV8.1
Description
An issue was discovered in Veritas Backup Exec before 21.2. The communication between a client and an Agent requires successful authentication, which is typically completed over a secure TLS communication. However, due to a vulnerability in the SHA Authentication scheme, an attacker is able to gain unauthorized access and complete the authentication process. Subsequently, the client can execute data management protocol commands on the authenticated connection. By using crafted input parameters in one of these commands, an attacker can access an arbitrary file on the system using System privileges.
CVE Details
CVSS v3.1 Score8.1
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published3/1/2021
Last Modified11/3/2025
Sourcekev
Honeypot Sightings0
CISA KEV
VendorVeritas
ProductBackup Exec Agent
Vulnerability NameVeritas Backup Exec Agent File Access Vulnerability
KEV Date Added2023-04-07
Remediation Due Date2023-04-28
Ransomware UseKnown
Affected Products
veritas:backup_exec
References
http://packetstormsecurity.com/files/168506/Veritas-Backup-Exec-Agent-Remote-Code-Execution.html(cve@mitre.org)
http://packetstormsecurity.com/files/168506/Veritas-Backup-Exec-Agent-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.veritas.com/content/support/en_US/security/VTS21-001#issue2(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-27876(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.