Revision History

  • 1.0: December 23, 2020: Initial version
  • 1.1: January 8, 2021: Added CVE ID

Summary

As part of our ongoing testing process Veritas has discovered an issue where Veritas System Recovery (VSR) could allow an attacker to run arbitrary code with administrator privilege.

Issue

CVE ID: CVE-2020-36160
Severity: Critical
CVSS v3.1 Base Score: 9.3 (AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)

On start-up, the Veritas System Recovery (VSR) application loads the OpenSSL library from \usr\local\ssl. This library attempts to load the from \usr\local\ssl\openssl.cnf configuration file which does not exist. By default, on Windows systems, users can create directories under C:\. A low privileged user on the Windows system without any privileges in VSR can create a C:\usr\local\ssl\openssl.cnf configuration file to load a malicious OpenSSL engine resulting in arbitrary code execution as SYSTEM when the service starts. This gives the attacker administrator access on the system, allowing the attacker (by default) to access all data, to access all installed applications, etc. If the system is also an Active Directory domain controller then this can affect the entire domain.

Affected Versions

Veritas System Recovery (VSR) Windows versions 21.1, 21, 18.0.4, 18.0.3, 18.0.2, 18.0.1, 18.0, 16.0.2, 16.0.1 and 16. Earlier unsupported versions may be affected as well.

Non-Windows platforms are not affected.

Remediation

Customers under a current maintenance contract can download and install Veritas System Recovery (VSR) 21.2 to fix the vulnerability.

See the Veritas Download Center for available updates: https://www.veritas.com/support/en_US/downloads

Questions

For questions or problems regarding these vulnerabilities please contact Veritas Technical Support (https://www.veritas.com/support).