← Voltar para CVEs
CVE-2025-34028
CRITICALCISA KEV10.0
Descricao
The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP. This issue affects Command Center Innovation Release: 11.38.0 to 11.38.20. The vulnerability is fixed in 11.38.20 with SP38-CU20-433 and SP38-CU20-436 and also fixed in 11.38.25 with SP38-CU25-434 and SP38-CU25-438.
Detalhes CVE
Pontuacao CVSS v3.110.0
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado4/22/2025
Ultima modificacao11/6/2025
Fontekev
Avistamentos honeypot0
CISA KEV
FornecedorCommvault
ProdutoCommand Center
Nome da vulnerabilidadeCommvault Command Center Path Traversal Vulnerability
Data inclusao KEV2025-05-02
Prazo de remediacao2025-05-23
Uso em ransomwareUnknown
Produtos afetados
commvault:commvaultlinux:linux_kernelmicrosoft:windows
Fraquezas (CWE)
CWE-22CWE-306CWE-22CWE-306
Referencias
https://documentation.commvault.com/securityadvisories/CV_2025_04_1.html(disclosure@vulncheck.com)
https://github.com/watchtowrlabs/watchTowr-vs-Commvault-PreAuth-RCE-CVE-2025-34028(disclosure@vulncheck.com)
https://labs.watchtowr.com/fire-in-the-hole-were-breaching-the-vault-commvault-remote-code-execution-cve-2025-34028/(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/commvault-command-center-innovation-release-unauthenticated-install-package-path-traversal(disclosure@vulncheck.com)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-34028(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.