First published: Fri Mar 07 2025(Updated: )
A vulnerability was discovered in the Arctera InfoScale 7.0 through 8.0.2 where a .NET remoting endpoint can be exploited due to the insecure deserialization of potentially untrusted messages. The vulnerability is present in the Windows Plugin_Host service, which runs on all the servers where InfoScale is installed. The service is used only when applications are configured for Disaster Recovery (DR) using the DR wizard. Disabling the Plugin_Host service manually will eliminate the vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Veritas InfoScale | >=7.0<=8.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-27816 is classified as high due to the potential for remote exploitation.
To fix CVE-2025-27816, upgrade your Arctera InfoScale software to version 8.0.3 or later.
CVE-2025-27816 affects Arctera InfoScale versions 7.0 through 8.0.2.
CVE-2025-27816 is an insecure deserialization vulnerability that can be exploited through a .NET remoting endpoint.
An attacker can exploit CVE-2025-27816 to execute arbitrary code on affected systems via crafted messages.