CVE-2023-26258
Summary
| CVE | CVE-2023-26258 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-07-03 15:15:00 UTC |
| Updated | 2023-07-12 21:15:00 UTC |
| Description | Arcserve UDP through 9.0.6034 allows authentication bypass. The method getVersionInfo at WebServiceImpl/services/FlashServiceImpl leaks the AuthUUID token. This token can be used at /WebServiceImpl/services/VirtualStandbyServiceImpl to obtain a valid session. This session can be used to execute any task as administrator. |
Risk And Classification
Problem Types: CWE-863
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| CVE-2023-26258 - Remote Code Execution in ArcServe UDP Backup - MDSec | MISC | www.mdsec.co.uk | |
| Unified Data & Cloud Data Protection | Arcserve | MISC | www.arcserve.com | |
| Arcserve Support Community | MISC | support.arcserve.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 378714 Arcserve UDP Remote Code Execution (RCE) Vulnerability