CVE-2023-26258
CRITICAL EXPLOITED NUCLEIArcserve UDP <9.0.6034 - Auth Bypass
Title source: llmDescription
Arcserve UDP through 9.0.6034 allows authentication bypass. The method getVersionInfo at WebServiceImpl/services/FlashServiceImpl leaks the AuthUUID token. This token can be used at /WebServiceImpl/services/VirtualStandbyServiceImpl to obtain a valid session. This session can be used to execute any task as administrator.
Exploits (1)
nomisec
WORKING POC
23 stars
by mdsecactivebreach · remote
https://github.com/mdsecactivebreach/CVE-2023-26258-ArcServe
Nuclei Templates (1)
Arcserve UDP <= 9.0.6034 - Authentication Bypass
CRITICALVERIFIEDby daffainfo
Shodan:
http.favicon.hash:-1889244460
References (3)
Scores
CVSS v3
9.8
EPSS
0.7936
EPSS Percentile
99.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2025-08-19
CWE
CWE-863
Status
published
Products (1)
arcserve/udp
< 9.0.6034
Published
Jul 03, 2023
Tracked Since
Feb 18, 2026