{"api_version":"1","generated_at":"2026-04-22T21:27:04+00:00","cve":"CVE-2019-18780","urls":{"html":"https://cve.report/CVE-2019-18780","api":"https://cve.report/api/cve/CVE-2019-18780.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-18780","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-18780"},"summary":{"title":"CVE-2019-18780","description":"An arbitrary command injection vulnerability in the Cluster Server component of Veritas InfoScale allows an unauthenticated remote attacker to execute arbitrary commands as root or administrator. These Veritas products are affected: Access 7.4.2 and earlier, Access Appliance 7.4.2 and earlier, Flex Appliance 1.2 and earlier, InfoScale 7.3.1 and earlier, InfoScale between 7.4.0 and 7.4.1, Veritas Cluster Server (VCS) 6.2.1 and earlier on Linux/UNIX, Veritas Cluster Server (VCS) 6.1 and earlier on Windows, Storage Foundation HA (SFHA) 6.2.1 and earlier on Linux/UNIX, and Storage Foundation HA (SFHA) 6.1 and earlier on Windows.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2019-11-05 20:15:00","updated_at":"2020-08-24 17:37:00"},"problem_types":["CWE-77"],"metrics":[],"references":[{"url":"https://www.veritas.com/content/support/en_US/security/VTS19-006","name":"https://www.veritas.com/content/support/en_US/security/VTS19-006","refsource":"MISC","tags":["Patch","Vendor Advisory"],"title":"VTS19-006: Arbitrary Command Injection Vulnerability in Multiple Veritas Products | Veritas™","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.veritas.com/content/support/en_US/security/VTS19-005","name":"https://www.veritas.com/content/support/en_US/security/VTS19-005","refsource":"MISC","tags":["Patch","Vendor Advisory"],"title":"VTS19-005: Arbitrary Command Injection Vulnerability in Veritas Access and Access Appliance | Veritas™","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.veritas.com/content/support/en_US/security/VTS19-004","name":"https://www.veritas.com/content/support/en_US/security/VTS19-004","refsource":"MISC","tags":["Patch","Vendor Advisory"],"title":"VTS19-004: Arbitrary Command Injection Vulnerability in Veritas Flex Appliance | Veritas™","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.veritas.com/content/support/en_US/security/VTS19-003","name":"https://www.veritas.com/content/support/en_US/security/VTS19-003","refsource":"MISC","tags":["Patch","Vendor Advisory"],"title":"VTS19-003: Arbitrary Command Injection Vulnerability in Veritas InfoScale and Related Products | Veritas™","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-18780","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18780","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"18780","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"18780","vulnerable":"0","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"18780","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"18780","vulnerable":"0","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"18780","vulnerable":"1","versionEndIncluding":"7.4.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"veritas","cpe5":"access","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"18780","vulnerable":"1","versionEndIncluding":"7.4.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"veritas","cpe5":"access_appliance","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"18780","vulnerable":"1","versionEndIncluding":"6.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"veritas","cpe5":"cluster_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"18780","vulnerable":"1","versionEndIncluding":"6.2.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"veritas","cpe5":"cluster_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"18780","vulnerable":"1","versionEndIncluding":"1.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"veritas","cpe5":"flex_appliance","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"18780","vulnerable":"1","versionEndIncluding":"7.3.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"veritas","cpe5":"infoscale","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"18780","vulnerable":"1","versionEndIncluding":"7.4.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"veritas","cpe5":"infoscale","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"18780","vulnerable":"1","versionEndIncluding":"6.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"veritas","cpe5":"storage_foundation_ha","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"18780","vulnerable":"1","versionEndIncluding":"6.2.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"veritas","cpe5":"storage_foundation_ha","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2019-18780","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An arbitrary command injection vulnerability in the Cluster Server component of Veritas InfoScale allows an unauthenticated remote attacker to execute arbitrary commands as root or administrator. These Veritas products are affected: Access 7.4.2 and earlier, Access Appliance 7.4.2 and earlier, Flex Appliance 1.2 and earlier, InfoScale 7.3.1 and earlier, InfoScale between 7.4.0 and 7.4.1, Veritas Cluster Server (VCS) 6.2.1 and earlier on Linux/UNIX, Veritas Cluster Server (VCS) 6.1 and earlier on Windows, Storage Foundation HA (SFHA) 6.2.1 and earlier on Linux/UNIX, and Storage Foundation HA (SFHA) 6.1 and earlier on Windows."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://www.veritas.com/content/support/en_US/security/VTS19-003","refsource":"MISC","name":"https://www.veritas.com/content/support/en_US/security/VTS19-003"},{"url":"https://www.veritas.com/content/support/en_US/security/VTS19-004","refsource":"MISC","name":"https://www.veritas.com/content/support/en_US/security/VTS19-004"},{"url":"https://www.veritas.com/content/support/en_US/security/VTS19-005","refsource":"MISC","name":"https://www.veritas.com/content/support/en_US/security/VTS19-005"},{"url":"https://www.veritas.com/content/support/en_US/security/VTS19-006","refsource":"MISC","name":"https://www.veritas.com/content/support/en_US/security/VTS19-006"}]}},"nvd":{"publishedDate":"2019-11-05 20:15:00","lastModifiedDate":"2020-08-24 17:37:00","problem_types":["CWE-77"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":10},"severity":"HIGH","exploitabilityScore":10,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:veritas:infoscale:*:*:*:*:*:*:*:*","versionStartIncluding":"7.4.0","versionEndIncluding":"7.4.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:veritas:infoscale:*:*:*:*:*:*:*:*","versionEndIncluding":"7.3.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:veritas:flex_appliance:*:*:*:*:*:*:*:*","versionEndIncluding":"1.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:veritas:access:*:*:*:*:*:*:*:*","versionEndIncluding":"7.4.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:veritas:access_appliance:*:*:*:*:*:*:*:*","versionEndIncluding":"7.4.2","cpe_name":[]}]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:veritas:cluster_server:*:*:*:*:*:*:*:*","versionEndIncluding":"6.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:veritas:storage_foundation_ha:*:*:*:*:*:*:*:*","versionEndIncluding":"6.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:veritas:cluster_server:*:*:*:*:*:*:*:*","versionEndIncluding":"6.2.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:veritas:storage_foundation_ha:*:*:*:*:*:*:*:*","versionEndIncluding":"6.2.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"18780","Ordinal":"160345","Title":"CVE-2019-18780","CVE":"CVE-2019-18780","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"18780","Ordinal":"1","NoteData":"An arbitrary command injection vulnerability in the Cluster Server component of Veritas InfoScale allows an unauthenticated remote attacker to execute arbitrary commands as root or administrator. These Veritas products are affected: Access 7.4.2 and earlier, Access Appliance 7.4.2 and earlier, Flex Appliance 1.2 and earlier, InfoScale 7.3.1 and earlier, InfoScale between 7.4.0 and 7.4.1, Veritas Cluster Server (VCS) 6.2.1 and earlier on Linux/UNIX, Veritas Cluster Server (VCS) 6.1 and earlier on Windows, Storage Foundation HA (SFHA) 6.2.1 and earlier on Linux/UNIX, and Storage Foundation HA (SFHA) 6.1 and earlier on Windows.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"18780","Ordinal":"2","NoteData":"2019-11-05","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"18780","Ordinal":"3","NoteData":"2019-11-05","Type":"Other","Title":"Modified"}]}}}