- 1.0: December 23, 2020: Initial version
- 1.1: January 8, 2021: Added CVE ID
- 1.2: February 17, 2021: Added Mitigation section
As part of our ongoing testing process Veritas has discovered an issue where Veritas System Recovery (VSR) could allow an attacker to run arbitrary code with administrator privilege.
On start-up, the Veritas System Recovery (VSR) application loads the OpenSSL library from \usr\local\ssl. This library attempts to load the from \usr\local\ssl\openssl.cnf configuration file which does not exist. By default, on Windows systems, users can create directories under C:\. A low privileged user on the Windows system without any privileges in VSR can create a C:\usr\local\ssl\openssl.cnf configuration file to load a malicious OpenSSL engine resulting in arbitrary code execution as SYSTEM when the service starts. This gives the attacker administrator access on the system, allowing the attacker (by default) to access all data, to access all installed applications, etc. If the system is also an Active Directory domain controller then this can affect the entire domain.
Veritas System Recovery (VSR) Windows versions 21.1, 21, 18.0.4, 18.0.3, 18.0.2, 18.0.1, 18.0, 16.0.2, 16.0.1 and 16. Earlier unsupported versions may be affected as well.
Non-Windows platforms are not affected.
Customers under a current maintenance contract can download and install Veritas System Recovery (VSR) 21.2 to fix the vulnerability.
If not applying a recommended remediation listed above, use an administrator account to create the directory ‘\usr\local\ssl’ under root of all drives and set the ACL on the directory to deny write access to all other users. This will prevent an attacker from installing a malicious OpenSSL engine.
See the Veritas Download Center for available updates: https://www.veritas.com/support/en_US/downloads
For questions or problems regarding these vulnerabilities please contact Veritas Technical Support (https://www.veritas.com/support).