New Privilege Escalation Vulnerability in Veritas NetBackup on Windows Reported

Summary: Veritas has issued a security advisory for a critical privilege escalation vulnerability in its NetBackup software on Windows systems, which could allow attackers to execute malicious code. The vulnerability affects various components of NetBackup and has been assigned a CVSS score of 7.8, indicating high severity.

Threat Actor: Unknown | unknown
Victim: Veritas | Veritas

Key Point :

  • The vulnerability affects NetBackup components running on Windows OS, allowing potential privilege escalation attacks.
  • Veritas recommends upgrading to NetBackup Version 10.5 or applying hotfixes for older supported versions to mitigate the risk.
  • For immediate mitigation, administrators can create a restricted directory on the root drive to prevent unauthorized write access.

Veritas has issued a security advisory addressing a significant privilege escalation vulnerability impacting its NetBackup software on Windows systems. This vulnerability, which affects NetBackup’s primary server, media server, and client components, exposes Windows-based NetBackup installations to potential privilege escalation attacks.

According to Veritas, “NetBackup primary server, media server, and clients running on Windows OS are vulnerable to an attack that could be used to escalate privileges.” The attack hinges on an attacker gaining write access to the root drive where NetBackup is installed, a situation that can allow the installation of a malicious DLL file. If a NetBackup user executes certain commands or is manipulated through social engineering tactics, the malicious DLL could be loaded, executing the attacker’s code within the user’s security context.

The vulnerability, which currently lacks a CVE assignment, has been given a CVSS score of 7.8, indicating a high level of severity. The advisory clarifies, “This only applies to NetBackup components running on a Windows Operating System,” making other OS environments safe from this particular exploit.

Veritas has outlined a broad spectrum of affected versions, including but not limited to:

  • NetBackup Client, Primary Server, and Media Server Components on versions 10.4.0.1, 10.4, 10.3.0.1, 10.3, 10.2.0.1, 10.2, 10.1.1, 10.1, 10.0.0.1, and 10.0.** Older, unsupported versions may also be at risk.

To mitigate this vulnerability, Veritas has recommended two primary paths for remediation:

  1. Upgrade to NetBackup Version 10.5: This new release addresses the vulnerability.
  2. Apply Hotfixes for Supported Older Versions: Veritas advises upgrading to NetBackup Version 10.4.0.1 or 10.3.0.1 and applying the hotfix from Veritas’ download center to secure these installations.

For organizations that are unable to immediately upgrade, Veritas has offered an alternate mitigation method. Administrators are advised to:

  • Create a directory named “bin” on the root drive where NetBackup is installed. For instance, if installed on the C: drive, a directory should be created at C:bin.
  • Restrict this directory’s access to administrative users only, preventing unauthorized write access that could enable the installation of malicious files.

Related Posts:

Source: https://securityonline.info/new-privilege-escalation-vulnerability-in-veritas-netbackup-on-windows-update-required-to-mitigate-risks