Vulnerability Details : CVE-2022-36987
An issue was discovered in Veritas NetBackup 8.1.x through 8.1.2, 8.2, 8.3.x through 8.3.0.2, 9.x through 9.0.0.1, and 9.1.x through 9.1.0.1 (and related NetBackup products). An attacker with authenticated access to a NetBackup Client could arbitrarily write files to a NetBackup Primary server.
Exploit prediction scoring system (EPSS) score for CVE-2022-36987
Probability of exploitation activity in the next 30 days: 0.05%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 19 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2022-36987
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
8.5
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H |
1.8
|
6.0
|
cve@mitre.org |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
2.8
|
3.6
|
nvd@nist.gov |
References for CVE-2022-36987
-
https://www.veritas.com/content/support/en_US/security/VTS22-004#h4
VTS22-004: HotFix for Security Advisory impacting NetBackup – Primary/Media Server | Veritas™Patch;Vendor Advisory
Products affected by CVE-2022-36987
- cpe:2.3:a:veritas:netbackup:9.1:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup:8.2:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup:9.0.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup:8.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup:8.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup:9.1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup:8.3:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup:8.3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup:8.3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup_appliance:3.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup_appliance:3.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup_appliance:3.2:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup_appliance:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:netbackup_appliance:4.1:*:*:*:*:*:*:*
- cpe:2.3:h:veritas:netbackup_appliance:4.0.0.1:maintenance_release1:*:*:*:*:*:*
- cpe:2.3:h:veritas:netbackup_appliance:4.0.0.1:maintenance_release2:*:*:*:*:*:*
- cpe:2.3:h:veritas:netbackup_appliance:4.0.0.1:maintenance_release3:*:*:*:*:*:*
- cpe:2.3:h:veritas:netbackup_appliance:4.1.0.1:maintenance_release1:*:*:*:*:*:*
- cpe:2.3:h:veritas:netbackup_appliance:4.1.0.1:maintenance_release2:*:*:*:*:*:*
- cpe:2.3:h:veritas:netbackup_appliance:3.2:maintenance_release1:*:*:*:*:*:*
- cpe:2.3:h:veritas:netbackup_appliance:3.2:maintenance_release2:*:*:*:*:*:*
- cpe:2.3:h:veritas:netbackup_appliance:3.2:maintenance_release3:*:*:*:*:*:*
- cpe:2.3:h:veritas:netbackup_appliance:3.3.0.1:maintenance_release1:*:*:*:*:*:*
- cpe:2.3:h:veritas:netbackup_appliance:3.3.0.1:maintenance_release2:*:*:*:*:*:*
- cpe:2.3:h:veritas:netbackup_appliance:3.3.0.2:maintenance_release1:*:*:*:*:*:*
- cpe:2.3:h:veritas:netbackup_appliance:3.3.0.2:maintenance_release2:*:*:*:*:*:*
- cpe:2.3:a:veritas:flex_appliance:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:flex_appliance:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:flex_appliance:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:flex_appliance:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:flex_appliance:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:flex_appliance:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:flex_scale:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:veritas:flex_scale:2.1:*:*:*:*:*:*:*