Vulnerability Details : CVE-2023-26258
Potential exploit
Arcserve UDP through 9.0.6034 allows authentication bypass. The method getVersionInfo at WebServiceImpl/services/FlashServiceImpl leaks the AuthUUID token. This token can be used at /WebServiceImpl/services/VirtualStandbyServiceImpl to obtain a valid session. This session can be used to execute any task as administrator.
Products affected by CVE-2023-26258
- cpe:2.3:a:arcserve:udp:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-26258
0.28%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 68 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-26258
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2023-26258
-
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-26258
-
https://www.arcserve.com/products/arcserve-udp
Unified Data & Cloud Data Protection | ArcserveProduct
-
https://www.mdsec.co.uk/2023/06/cve-2023-26258-remote-code-execution-in-arcserve-udp-backup/
CVE-2023-26258 - Remote Code Execution in ArcServe UDP Backup - MDSecExploit;Technical Description;Third Party Advisory
-
https://support.arcserve.com/s/article/KB000015720?language=en_US
Article Detail
Jump to