← Retour aux CVEs
CVE-2023-26258
CRITICAL9.8
Description
Arcserve UDP through 9.0.6034 allows authentication bypass. The method getVersionInfo at WebServiceImpl/services/FlashServiceImpl leaks the AuthUUID token. This token can be used at /WebServiceImpl/services/VirtualStandbyServiceImpl to obtain a valid session. This session can be used to execute any task as administrator.
Details CVE
Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie7/3/2023
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
arcserve:udp
Faiblesses (CWE)
CWE-863
References
https://www.arcserve.com/products/arcserve-udp(cve@mitre.org)
https://www.mdsec.co.uk/2023/06/cve-2023-26258-remote-code-execution-in-arcserve-udp-backup/(cve@mitre.org)
https://support.arcserve.com/s/article/KB000015720?language=en_US(af854a3a-2127-422b-91ae-364da2661108)
https://www.arcserve.com/products/arcserve-udp(af854a3a-2127-422b-91ae-364da2661108)
https://www.mdsec.co.uk/2023/06/cve-2023-26258-remote-code-execution-in-arcserve-udp-backup/(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.