
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical vulnerability (CVE-2021-27878) was discovered in Veritas Backup Exec versions prior to 21.2. The vulnerability stems from a flaw in the SHA Authentication scheme that allows attackers to bypass authentication and execute privileged commands. The issue was initially disclosed on March 1, 2021, affecting all Backup Exec Agent installations across all platforms in versions 16.x, 20.x, and 21.1 (Veritas Advisory). The vulnerability received a CVSS v3.1 base score of 8.8 (High), indicating its severe nature (NVD).
The vulnerability exists in the communication process between a client and the Backup Exec Agent. While this communication typically requires successful authentication over a secure TLS connection, a flaw in the SHA Authentication scheme enables unauthorized access. Once authentication is bypassed, an attacker can execute data management protocol commands on the authenticated connection, potentially leading to arbitrary command execution with system privileges (Veritas Advisory). The vulnerability has been assigned a CVSS vector of CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating network accessibility, low attack complexity, and high impact across confidentiality, integrity, and availability (NVD).
The exploitation of this vulnerability can lead to severe consequences as it allows attackers to execute arbitrary commands with system privileges on the affected system. This level of access could potentially enable complete system compromise, data theft, and system manipulation (Veritas Advisory).
The primary mitigation is to upgrade to Veritas Backup Exec version 21.2 or later, which contains the fix for this vulnerability. For systems that cannot be immediately updated, Veritas provided a workaround involving registry modification. Administrators should check for the registry key 'Software\Veritas\Backup Exec For Windows\Backup Exec\Engine\Agents\XBSA\Machine\DBAID'. If it doesn't exist, create it as a string (REG_SZ) type and set its value to a random hexadecimal string to prevent exploitation of the SHA authentication scheme (Veritas Advisory).
The vulnerability gained significant attention when CISA added it to their Known Exploited Vulnerabilities catalog, requiring Federal Civilian Executive Branch agencies to patch their systems by April 28, 2023. The discovery of its exploitation by ransomware groups has heightened concerns in the cybersecurity community (CISA Alert).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."