CVE-2021-27876

HIGH KEV RANSOMWARE

Veritas Backup Exec <21.2 - Auth Bypass

Title source: llm

Description

An issue was discovered in Veritas Backup Exec before 21.2. The communication between a client and an Agent requires successful authentication, which is typically completed over a secure TLS communication. However, due to a vulnerability in the SHA Authentication scheme, an attacker is able to gain unauthorized access and complete the authentication process. Subsequently, the client can execute data management protocol commands on the authenticated connection. By using crafted input parameters in one of these commands, an attacker can access an arbitrary file on the system using System privileges.

Exploits (1)

metasploit WORKING POC EXCELLENT
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/veritas/beagent_sha_auth_rce.rb

Scores

CVSS v3 8.1
EPSS 0.0085
EPSS Percentile 74.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Details

CISA KEV 2023-04-07
VulnCheck KEV 2023-04-03
InTheWild.io 2023-04-07
ENISA EUVD EUVD-2021-14614
Ransomware Use Confirmed
Status published
Products (1)
veritas/backup_exec < 21.2
Published Mar 01, 2021
KEV Added Apr 07, 2023
Tracked Since Feb 18, 2026