Vulnerability Details : CVE-2022-36985
An issue was discovered in Veritas NetBackup 8.1.x through 8.1.2, 8.2, 8.3.x through 8.3.0.2, 9.x through 9.0.0.1, and 9.1.x through 9.1.0.1 (and related NetBackup products). An attacker with unprivileged local access to a Windows NetBackup Primary server could potentially escalate their privileges.
Exploit prediction scoring system (EPSS) score for CVE-2022-36985
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 10 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2022-36985
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
MITRE |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
References for CVE-2022-36985
-
https://www.veritas.com/content/support/en_US/security/VTS22-004#h7
VTS22-004: HotFix for Security Advisory impacting NetBackup – Primary/Media Server | Veritas™Patch;Vendor Advisory
Products affected by CVE-2022-36985
- cpe:2.3:a:veritas:netbackup:9.1:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup:8.2:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup:9.0.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup:8.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup:8.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup:9.1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup:8.3:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup:8.3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup:8.3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup_appliance:3.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup_appliance:3.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup_appliance:3.2:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup_appliance:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup_appliance:4.1:*:*:*:*:*:*:*
- cpe:2.3:h:veritas:netbackup_appliance:4.0.0.1:maintenance_release1:*:*:*:*:*:*
- cpe:2.3:h:veritas:netbackup_appliance:4.0.0.1:maintenance_release2:*:*:*:*:*:*
- cpe:2.3:h:veritas:netbackup_appliance:4.0.0.1:maintenance_release3:*:*:*:*:*:*
- cpe:2.3:h:veritas:netbackup_appliance:4.1.0.1:maintenance_release1:*:*:*:*:*:*
- cpe:2.3:h:veritas:netbackup_appliance:4.1.0.1:maintenance_release2:*:*:*:*:*:*
- cpe:2.3:h:veritas:netbackup_appliance:3.2:maintenance_release1:*:*:*:*:*:*
- cpe:2.3:h:veritas:netbackup_appliance:3.2:maintenance_release2:*:*:*:*:*:*
- cpe:2.3:h:veritas:netbackup_appliance:3.2:maintenance_release3:*:*:*:*:*:*
- cpe:2.3:h:veritas:netbackup_appliance:3.3.0.1:maintenance_release1:*:*:*:*:*:*
- cpe:2.3:h:veritas:netbackup_appliance:3.3.0.1:maintenance_release2:*:*:*:*:*:*
- cpe:2.3:h:veritas:netbackup_appliance:3.3.0.2:maintenance_release1:*:*:*:*:*:*
- cpe:2.3:h:veritas:netbackup_appliance:3.3.0.2:maintenance_release2:*:*:*:*:*:*
- cpe:2.3:a:veritas:flex_appliance:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:flex_appliance:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:flex_appliance:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:flex_appliance:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:flex_appliance:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:flex_appliance:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:flex_scale:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:flex_scale:2.1:*:*:*:*:*:*:*