Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content management solution.
The vulnerability, rated with a CVSS v3.1 Base Score of 9.8 (Critical), could allow attackers to execute arbitrary code on affected servers.
This exploit leverages vulnerabilities inherent to the .NET Remoting service used by Enterprise Vault.
The issue stems from the .NET Remoting TCP ports that Enterprise Vault services utilize during start-up.
These ports, which are dynamically allocated, are susceptible to exploitation. A malicious attacker can exploit these TCP remoting services as well as the local Inter-Process Communication (IPC) services on the Enterprise Vault server by sending specially crafted data.
Fortunately, exploiting this vulnerability is not straightforward and requires several preconditions to be met, including:
If these conditions are fulfilled, an attacker could execute remote code on the server, potentially compromising sensitive data and causing significant damage.
Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar
This vulnerability impacts all currently supported versions of Enterprise Vault, including:
Earlier unsupported versions may also be affected, heightening the urgency for organizations relying on legacy systems to review their security posture.
While Veritas has announced plans to remediate this vulnerability in Enterprise Vault version 15.2, expected to be generally available in the third quarter of 2025, immediate mitigation steps are advised to protect against potential exploits. Organizations should:
Veritas has acknowledged the vulnerability and credited Sina Kheirkhah, working with Trend Micro’s Zero Day Initiative (ZDI), for responsibly disclosing it.
The company encourages affected customers to reach out to Veritas Technical Support for any questions or assistance related to this issue.
Analyze cyber threats with ANYRUN's powerful sandbox. Black Friday Deals : Get up to 3 Free Licenses.
Meta has announced the removal of over 2 million accounts connected to malicious activities, including…
A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…
A massive data breach has sent shockwaves across the globe, as a database containing sensitive…
Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as "GruesomeLarch"…
Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by Egypt-based…
The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in Central…