First published: Wed Dec 11 2024(Updated: )
This vulnerability allows remote attackers to execute web requests with the target user's privileges on affected installations of Veritas Enterprise Vault. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.3. The following CVEs are assigned: CVE-2024-52942.
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Enterprise Vault |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-24696 is critical due to the potential for remote code execution.
To fix ZDI-CAN-24696, update Veritas Enterprise Vault to the latest version provided by the vendor.
The potential impacts of ZDI-CAN-24696 include unauthorized access to user privileges and possible data compromise.
ZDI-CAN-24696 affects installations of Veritas Enterprise Vault where user interaction can be triggered.
ZDI-CAN-24696 facilitates remote attacks that allow execution of web requests with the target user's privileges.