Security News > 2024 > March > PoC for critical Arcserve UDP vulnerabilities published (CVE-2024-0799, CVE-2024-0800)
Arcserve has fixed critical security vulnerabilities in its Unified Data Protection solution that can be chained to upload malicious files to the underlying Windows system.
Tenable researchers have published a PoC exploit script demonstrating the attack, as well as one for triggering a third flaw that can lead to denial of service.
Arcserve UDP is a widely used enterprise backup and disaster recovery solution, as well as.
"Once authenticated, the attacker can perform UDP Console tasks that require authentication," Tenable researchers explained.
CVE-2024-0800 is a path traversal vulnerability that can be used by authenticated attackers to "Upload arbitrary files to any directory on the file system where the UDP Console is installed."
The vulnerabilities have been fixed via security patches for Arcserve UDP versions 9.2 and 8.1.
News URL
https://www.helpnetsecurity.com/2024/03/14/cve-2024-0799-cve-2024-0800/
Related news
- Critical vulnerabilities in TeamCity JetBrains fixed, release of technical details imminent, patch quickly! (CVE-2024-27198, CVE-2024-27199) (source)
- Critical FortiClient EMS vulnerability fixed, (fake?) PoC for sale (CVE-2023-48788) (source)
- PoC exploit for critical Fortra FileCatalyst MFT vulnerability released (CVE-2024-25153) (source)
- PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389) (source)
- Microsoft's March Updates Fix 61 Vulnerabilities, Including Critical Hyper-V Flaws (source)
- Ivanti patches critical Avalanche flaw exploitable via a simple message (CVE-2024-29204) (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-03-13 | CVE-2024-0800 | A path traversal vulnerability exists in Arcserve Unified Data Protection 9.2 and 8.1 in edge-app-base-webui.jar!com.ca.arcserve.edge.app.base.ui.server.servlet.ImportNodeServlet. | 0.0 |