Wiz Agents & Workflows are here

CVE-2021-27878
Veritas Backup Exec Agent vulnerability analysis and mitigation

Overview

A critical vulnerability (CVE-2021-27878) was discovered in Veritas Backup Exec versions prior to 21.2. The vulnerability stems from a flaw in the SHA Authentication scheme that allows attackers to bypass authentication and execute privileged commands. The issue was initially disclosed on March 1, 2021, affecting all Backup Exec Agent installations across all platforms in versions 16.x, 20.x, and 21.1 (Veritas Advisory). The vulnerability received a CVSS v3.1 base score of 8.8 (High), indicating its severe nature (NVD).

Technical details

The vulnerability exists in the communication process between a client and the Backup Exec Agent. While this communication typically requires successful authentication over a secure TLS connection, a flaw in the SHA Authentication scheme enables unauthorized access. Once authentication is bypassed, an attacker can execute data management protocol commands on the authenticated connection, potentially leading to arbitrary command execution with system privileges (Veritas Advisory). The vulnerability has been assigned a CVSS vector of CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating network accessibility, low attack complexity, and high impact across confidentiality, integrity, and availability (NVD).

Impact

The exploitation of this vulnerability can lead to severe consequences as it allows attackers to execute arbitrary commands with system privileges on the affected system. This level of access could potentially enable complete system compromise, data theft, and system manipulation (Veritas Advisory).

Mitigation and workarounds

The primary mitigation is to upgrade to Veritas Backup Exec version 21.2 or later, which contains the fix for this vulnerability. For systems that cannot be immediately updated, Veritas provided a workaround involving registry modification. Administrators should check for the registry key 'Software\Veritas\Backup Exec For Windows\Backup Exec\Engine\Agents\XBSA\Machine\DBAID'. If it doesn't exist, create it as a string (REG_SZ) type and set its value to a random hexadecimal string to prevent exploitation of the SHA authentication scheme (Veritas Advisory).

Community reactions

The vulnerability gained significant attention when CISA added it to their Known Exploited Vulnerabilities catalog, requiring Federal Civilian Executive Branch agencies to patch their systems by April 28, 2023. The discovery of its exploitation by ransomware groups has heightened concerns in the cybersecurity community (CISA Alert).

Additional resources


SourceThis report was generated using AI

Related Veritas Backup Exec Agent vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2021-27877CRITICAL9.8
  • Veritas Backup Exec AgentVeritas Backup Exec Agent
  • cpe:2.3:a:veritas:backup_exec
YesYesMar 01, 2021
CVE-2021-27878HIGH8.8
  • Veritas Backup Exec AgentVeritas Backup Exec Agent
  • cpe:2.3:a:veritas:backup_exec
YesYesMar 01, 2021
CVE-2021-27876HIGH8.1
  • Veritas Backup Exec AgentVeritas Backup Exec Agent
  • cpe:2.3:a:veritas:backup_exec
YesYesMar 01, 2021
CVE-2024-33673HIGH7.8
  • Veritas Backup Exec AgentVeritas Backup Exec Agent
  • cpe:2.3:a:veritas:backup_exec
NoYesApr 26, 2024
CVE-2024-33671HIGH7.1
  • Veritas Backup Exec AgentVeritas Backup Exec Agent
  • cpe:2.3:a:veritas:backup_exec
NoYesApr 26, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management