- 1.0: November 5, 2019, initial release
Arbitrary command injection vulnerability in the Veritas Flex Appliance.
|1||Arbitrary command injection vulnerability in the Cluster Server component of Veritas InfoScale included in Veritas Flex Appliance allows an unauthenticated remote attacker to execute arbitrary commands as root.||Critical|
There is an arbitrary command injection vulnerability in the Cluster Server (VCS) component of Veritas InfoScale that is included in Veritas Flex Appliance. This vulnerability allows an unauthenticated remote attacker to execute arbitrary commands on the appliance as root, potentially allowing an attacker to take complete control of the appliance.
This issue could result in:
- The loss of data managed by the appliance.
- The loss of confidentiality of data managed by the appliance.
- The loss of data on other systems for which Flex Appliance has stored credentials. The appliance encrypts these credentials, however an attacker would have access to the keys needed to decrypt them.
- The installation of malware or crypto-mining software on the appliance.
Other undesirable outcomes are also possible.
CVE ID: To be assigned
CVSS v3 Base Score: 9.8 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)
- Flex 1.2 and earlier
- This vulnerability can be mitigated by routing all traffic to the appliance through a firewall and having the firewall block all traffic on port 14150.
- The VCS Command Server (CmdServer) service can be disabled to address this vulnerability. Contact Veritas Technical Support and ask your representative to reference article 100046298.
If you have any questions about any information in this security advisory please contact Veritas technical support.
As part of normal best practices, Veritas recommends that customers:
- Restrict access of administration or management systems to privileged users.
- Restrict remote access, if required, to trusted/authorized systems only.
- Keep all operating systems and applications updated with the latest vendor patches.
- Follow a multi-layered approach to security. Run both firewall and anti-malware applications, at a minimum, to provide multiple points of detection and protection to both inbound and outbound threats.
- Deploy network and host-based intrusion detection systems to monitor network traffic for signs of anomalous or suspicious activity. This may aid in detection of attacks or malicious activity related to exploitation of latent vulnerabilities
THE SECURITY ADVISORY IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. Veritas Technologies LLC SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
Veritas Technologies LLC
2625 Augustine Drive
Santa Clara, CA 95054
© 2019 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas Logo, and NetBackup are trademarks or registered trademarks of Veritas Technologies LLC or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.