CVE-2008-4397
Broadcom Arcserve Backup - Path Traversal
Title source: ruleDescription
Directory traversal vulnerability in the RPC interface (asdbapi.dll) in CA ARCserve Backup (formerly BrightStor ARCserve Backup) r11.1 through r12.0 allows remote attackers to execute arbitrary commands via a .. (dot dot) in an RPC call with opnum 0x10A.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16404
metasploit
WORKING POC
NORMAL
by Nahuel Cayento Riva, MC · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/brightstor/ca_arcserve_342.rb
References (9)
Scores
EPSS
0.8582
EPSS Percentile
99.4%
Details
CWE
CWE-20
CWE-22
Status
published
Products (6)
broadcom/arcserve_backup
r12.0
broadcom/business_protection_suite
r2
broadcom/server_protection_suite
r2
ca/arcserve_backup
r11.1
ca/arcserve_backup
r11.5
ca/business_protection_suite
r2 (2 CPE variants)
Published
Oct 14, 2008
Tracked Since
Feb 18, 2026