First published: Thu Jan 13 2022(Updated: )
This vulnerability allows remote attackers to bypass authentication on affected installations of Commvault CommCell 11.22.22. Authentication is not required to exploit this vulnerability. The specific flaw exists within the CVSearchService service. The issue results from the lack of proper validation prior to authentication. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-13706.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Commvault | =11.22.22 | |
Commvault |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34993 has a high severity rating due to its potential for unauthorized access and exploitation by remote attackers.
To fix CVE-2021-34993, upgrade Commvault CommCell to a version that addresses this vulnerability.
Any installation of Commvault CommCell version 11.22.22 is vulnerable to CVE-2021-34993.
Yes, CVE-2021-34993 can be exploited without authentication, allowing remote attackers to bypass security measures.
The CVSearchService service is the specific component affected by CVE-2021-34993.