CVE-2024-0799 Scanner
CVE-2024-0799 Scanner - Unauthorized Admin Access vulnerability in Arcserve Unified Data Protection
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
23 days 13 hours
Scan only one
Domain, Subdomain, IPv4
Toolbox
Arcserve Unified Data Protection is widely used by organizations to ensure their data is secure and backed up in a comprehensive manner. It is a trusted solution for data backup, disaster recovery, and archiving, playing a critical role in an organization's data protection strategy. The software is applicable across various industries, from healthcare to financial services, due to its robustness and reliability. Typically deployed by IT departments, its primary purpose is to minimize downtime and data loss in the event of a disaster or system failure. By using Arcserve, companies ensure they're meeting compliance requirements related to data retention and protection. Its easy integration into existing IT environments makes it a favorable choice for companies regardless of their size.
An unauthorized admin access vulnerability allows attackers to bypass authentication mechanisms protecting sensitive data and system configurations. This vulnerability exists in specific versions of Arcserve Unified Data Protection due to flaws in the authentication process within certain functions. It could permit attackers to gain control over backup settings, delete backup data, or conduct other malicious activities without authorization. Such access can lead to significant data breaches, affecting the confidentiality, integrity, and availability of the impacted systems. Detecting and addressing this vulnerability is crucial to maintaining security and preventing unauthorized access. Timely identification of this flaw could prevent exploitation by malicious entities.
The technical vulnerability lies within the edge-app-base-webui.jar!com.ca.arcserve.edge.app.base.ui.server.EdgeLoginServiceImpl.doLogin() function. It specifically affects the wizardLogin component, allowing attackers to bypass authentication. Attackers can achieve this by manipulating certain HTTP requests with specific headers to gain unauthorized access to the system. The endpoint vulnerable to this bypass is the /management/wizardLogin with specific conditions in HTTP response headers. Successful exploitation results in unauthorized system access, allowing attackers to perform actions as an administrator. This presents a significant risk as it undermines the system's security controls and protocols.
When exploited, this vulnerability can lead to unauthorized access, data breach, and compromised integrity and confidentiality of the system. Such exploitation could allow attackers to alter backup configurations, delete data, or install malicious software. The organization might face severe reputational damage and loss of customer trust. Additionally, there would be legal and compliance implications if sensitive data is exposed or critical business processes are disrupted. Preventing exploitation by applying security updates is critical to maintaining operational integrity and trust.
REFERENCES