
Cloud Vulnerability DB
A community-led vulnerabilities database
An authentication vulnerability was discovered in Veritas Backup Exec before version 21.2, identified as CVE-2021-27877. The software supports multiple authentication schemes, including SHA authentication, which although no longer used in current versions, remained enabled. This vulnerability was disclosed on March 1, 2021, affecting all Veritas Backup Exec versions 16.x, 20.x, and 21.1 across all platforms (Veritas Advisory).
The vulnerability allows remote attackers to exploit the SHA authentication scheme to gain unauthorized access to the Backup Exec Agent and execute privileged commands. The issue received a CVSS v3.1 base score of 9.8 (Critical) from NVD and 8.2 (High) from MITRE, with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating network accessibility, low attack complexity, and no required privileges or user interaction (NVD).
If exploited, this vulnerability enables attackers to gain unauthorized access to the Backup Exec Agent and execute privileged commands on the system. The vulnerability has been associated with ransomware attacks, making it particularly critical for organizations to address (Veritas Advisory).
The vulnerability has been fixed in Veritas Backup Exec version 21.2. For systems that cannot be immediately updated, a mitigation involves checking for and configuring a specific registry key: 'Software\Veritas\Backup Exec For Windows\Backup Exec\Engine\Agents\XBSA\Machine\DBAID'. If the key doesn't exist, it should be created as a string (REGSZ) with a random hexadecimal value to prevent exploitation of the SHA authentication scheme ([Veritas Advisory](https://www.veritas.com/content/support/enUS/security/VTS21-001#issue1)).
The vulnerability's severity prompted CISA to add it to their Known Exploited Vulnerabilities (KEV) catalog on April 7, 2023, with a remediation due date of April 28, 2023. This action required Federal Civilian Executive Branch agencies to patch their systems according to the vendor's instructions (Hacker News).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."