First published: Mon Jul 03 2023(Updated: )
Arcserve UDP through 9.0.6034 allows authentication bypass. The method getVersionInfo at WebServiceImpl/services/FlashServiceImpl leaks the AuthUUID token. This token can be used at /WebServiceImpl/services/VirtualStandbyServiceImpl to obtain a valid session. This session can be used to execute any task as administrator.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Arcserve UDP | <=9.0.6034 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26258 is a vulnerability in Arcserve UDP through 9.0.6034 that allows authentication bypass, leading to remote code execution.
CVE-2023-26258 has a severity rating of 9.8, which is considered critical.
Exploiting CVE-2023-26258 requires obtaining the leaked AuthUUID token from the getVersionInfo method and using it to obtain a valid session, which can then be used to execute arbitrary code.
Yes, Arcserve has released a fix for CVE-2023-26258. It is recommended to update to a version that is not affected by the vulnerability.
You can find more information about CVE-2023-26258 on the Arcserve support website and the official Arcserve UDP product page.