An issue was discovered in Veritas Backup Exec before 21.2. The communication between a client and an Agent requires successful authentication, which is typically completed over a secure TLS communication. However, due to a vulnerability in the SHA Authentication scheme, an attacker is able to gain unauthorized access and complete the authentication process. Subsequently, the client can execute data management protocol commands on the authenticated connection. By using crafted input parameters in one of these commands, an attacker can access an arbitrary file on the system using System privileges.
Metrics
Affected Vendors & Products
References
History
Mon, 03 Feb 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
kev
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-03T16:18:28.806Z
Reserved: 2021-03-01T00:00:00.000Z
Link: CVE-2021-27876

Updated: 2024-08-03T21:33:17.306Z

Status : Modified
Published: 2021-03-01T22:15:14.350
Modified: 2024-11-21T05:58:40.010
Link: CVE-2021-27876

No data.