CVE-2023-41999
Arcserve Unified Data Protection vulnerability analysis and mitigation

Overview

An authentication bypass vulnerability (CVE-2023-41999) exists in Arcserve UDP versions prior to 9.2. The vulnerability was discovered by Tenable researchers and disclosed to Arcserve in August 2023. This critical vulnerability allows an unauthenticated, remote attacker to obtain a valid authentication identifier that enables them to authenticate to the management console and perform tasks requiring authentication (Tenable Advisory).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (Critical) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The vulnerability specifically affects the management console's authentication mechanism, where attackers can exploit the ValidateUserByUUID() function to obtain valid authentication UUIDs. Once authenticated, attackers can perform administrative actions, including accessing 'Edge Account' credentials (Tenable Advisory).

Impact

The successful exploitation of this vulnerability allows attackers to gain unauthorized access to the management console with administrative privileges. Once authenticated, attackers can perform any actions that require authentication, including accessing sensitive administrative credentials and potentially compromising the entire system (Help Net Security).

Mitigation and workarounds

Organizations are strongly recommended to upgrade to Arcserve UDP version 9.2 or later. For environments that cannot upgrade to version 9.2, Arcserve has released manual patches for older supported versions: UDP 9.1 (P00002967), UDP 8.1 (P00002968), and UDP 7.0 Update 2 (P00002983). These patches must be applied individually to each node (Tenable Advisory).

Additional resources


SourceThis report was generated using AI

Related Arcserve Unified Data Protection vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-34523CRITICAL9.2
  • Arcserve Unified Data ProtectionArcserve Unified Data Protection
  • cpe:2.3:a:arcserve:udp
NoYesAug 27, 2025
CVE-2025-34522CRITICAL9.2
  • Arcserve Unified Data ProtectionArcserve Unified Data Protection
  • cpe:2.3:a:arcserve:udp
NoYesAug 27, 2025
CVE-2025-34520HIGH7.7
  • Arcserve Unified Data ProtectionArcserve Unified Data Protection
  • cpe:2.3:a:arcserve:udp
NoYesAug 27, 2025
CVE-2024-0801HIGH7.5
  • Arcserve Unified Data ProtectionArcserve Unified Data Protection
  • cpe:2.3:a:arcserve:udp
NoNoMar 13, 2024
CVE-2025-34521MEDIUM4.8
  • Arcserve Unified Data ProtectionArcserve Unified Data Protection
  • cpe:2.3:a:arcserve:udp
NoYesAug 27, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management