A vulnerability was discovered in the Arctera InfoScale 7.0 through 8.0.2 where a .NET remoting endpoint can be exploited due to the insecure deserialization of potentially untrusted messages. The vulnerability is present in the Windows Plugin_Host service, which runs on all the servers where InfoScale is installed. The service is used only when applications are configured for Disaster Recovery (DR) using the DR wizard. Disabling the Plugin_Host service manually will eliminate the vulnerability.
Metrics
Affected Vendors & Products
References
History
Fri, 07 Mar 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-502 | |
Metrics |
ssvc
|
Fri, 07 Mar 2025 08:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was discovered in the Arctera InfoScale 7.0 through 8.0.2 where a .NET remoting endpoint can be exploited due to the insecure deserialization of potentially untrusted messages. The vulnerability is present in the Windows Plugin_Host service, which runs on all the servers where InfoScale is installed. The service is used only when applications are configured for Disaster Recovery (DR) using the DR wizard. Disabling the Plugin_Host service manually will eliminate the vulnerability. | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-07T19:35:44.406Z
Reserved: 2025-03-07T00:00:00.000Z
Link: CVE-2025-27816

Updated: 2025-03-07T19:35:39.528Z

Status : Received
Published: 2025-03-07T08:15:44.527
Modified: 2025-03-07T20:15:38.900
Link: CVE-2025-27816

No data.