CVE-2020-37045
Veritas · Veritas Multiple Products
A high-severity vulnerability has been identified in multiple Veritas products, including NetBackup 7.
Executive summary
A high-severity vulnerability has been identified in multiple Veritas products, including NetBackup 7. This flaw could allow an attacker to compromise the backup infrastructure, potentially leading to unauthorized access, modification, or deletion of critical backup data, thereby severely impacting an organization's disaster recovery and business continuity capabilities.
Vulnerability
This vulnerability likely stems from an improper input validation or deserialization flaw within a core service of the Veritas NetBackup application. An unauthenticated remote attacker could exploit this by sending a specially crafted network packet to a listening service on the NetBackup server. Successful exploitation would result in arbitrary code execution with the privileges of the NetBackup service, granting the attacker a significant foothold on the system and access to the backup environment.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.8. The business impact of a successful exploit is significant. As NetBackup servers manage an organization's most critical data backups, their compromise could lead to catastrophic consequences, including the theft of sensitive corporate or customer data, destruction or ransomware encryption of all backup sets, and a complete loss of disaster recovery capabilities. This poses a direct threat to business continuity and could result in severe financial loss, regulatory penalties, and reputational damage.
Remediation
Immediate Action: The primary remediation is to apply the security updates provided by Veritas to all affected systems immediately. This action directly patches the vulnerability and is the most effective method of mitigating the risk. After patching, administrators should review system and application access logs for any signs of compromise that may have occurred prior to the update.
Proactive Monitoring: Implement enhanced monitoring on NetBackup servers. Security teams should look for unusual inbound connection attempts to NetBackup service ports, unexpected process creation or command execution by the NetBackup service account, and large or anomalous data transfers from the backup server. Configure alerts for repeated failed authentication attempts followed by a success from an unknown source.
Compensating Controls: If immediate patching is not feasible, implement the following compensating controls:
- Restrict network access to NetBackup servers and their management interfaces, allowing connections only from trusted administrative subnets.
- Use a host-based firewall to explicitly deny all traffic to the affected services from unauthorized sources.
- Increase the logging level for NetBackup applications and forward logs to a centralized SIEM for correlation and analysis.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Due to the high severity of this vulnerability and the critical role of NetBackup in maintaining business continuity, we strongly recommend that organizations prioritize the immediate application of vendor-supplied security updates. Although this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its potential for severe disruption warrants urgent attention. All compensating controls should be considered secondary to patching and should be implemented if a maintenance window for patching is not immediately available.