First published: Tue Nov 05 2019(Updated: )
An arbitrary command injection vulnerability in the Cluster Server component of Veritas InfoScale allows an unauthenticated remote attacker to execute arbitrary commands as root or administrator. These Veritas products are affected: Access 7.4.2 and earlier, Access Appliance 7.4.2 and earlier, Flex Appliance 1.2 and earlier, InfoScale 7.3.1 and earlier, InfoScale between 7.4.0 and 7.4.1, Veritas Cluster Server (VCS) 6.2.1 and earlier on Linux/UNIX, Veritas Cluster Server (VCS) 6.1 and earlier on Windows, Storage Foundation HA (SFHA) 6.2.1 and earlier on Linux/UNIX, and Storage Foundation HA (SFHA) 6.1 and earlier on Windows.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Veritas Access | <=7.4.2 | |
Veritas Access Appliance | <=7.4.2 | |
Veritas Flex Appliance | <=1.2 | |
Veritas InfoScale | <=7.3.1 | |
Veritas InfoScale | >=7.4.0<=7.4.1 | |
Veritas Cluster Server | <=6.1 | |
Veritas Storage Foundation Ha | <=6.1 | |
Microsoft Windows | ||
Veritas Cluster Server | <=6.2.1 | |
Veritas Storage Foundation Ha | <=6.2.1 | |
Linux Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18780 is an arbitrary command injection vulnerability in the Cluster Server component of Veritas InfoScale.
CVE-2019-18780 allows an unauthenticated remote attacker to execute arbitrary commands as root or administrator on Veritas products, including Veritas Access, Veritas Access Appliance, Veritas Flex Appliance, Veritas InfoScale, Veritas Cluster Server, and Veritas Storage Foundation HA.
CVE-2019-18780 has a severity score of 9.8 (Critical).
To fix CVE-2019-18780, users should update to the latest versions of Veritas products mentioned above and follow the recommendations provided by Veritas in their security advisories.
More information about CVE-2019-18780 can be found in the official Veritas security advisories: [Link 1](https://www.veritas.com/content/support/en_US/security/VTS19-003), [Link 2](https://www.veritas.com/content/support/en_US/security/VTS19-004), [Link 3](https://www.veritas.com/content/support/en_US/security/VTS19-005).