← Back to CVEs
CVE-2023-26258
CRITICAL9.8
Description
Arcserve UDP through 9.0.6034 allows authentication bypass. The method getVersionInfo at WebServiceImpl/services/FlashServiceImpl leaks the AuthUUID token. This token can be used at /WebServiceImpl/services/VirtualStandbyServiceImpl to obtain a valid session. This session can be used to execute any task as administrator.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published7/3/2023
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
arcserve:udp
Weaknesses (CWE)
CWE-863
References
https://www.arcserve.com/products/arcserve-udp(cve@mitre.org)
https://www.mdsec.co.uk/2023/06/cve-2023-26258-remote-code-execution-in-arcserve-udp-backup/(cve@mitre.org)
https://support.arcserve.com/s/article/KB000015720?language=en_US(af854a3a-2127-422b-91ae-364da2661108)
https://www.arcserve.com/products/arcserve-udp(af854a3a-2127-422b-91ae-364da2661108)
https://www.mdsec.co.uk/2023/06/cve-2023-26258-remote-code-execution-in-arcserve-udp-backup/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.