www.veritas.com
Open in
urlscan Pro
104.109.64.148
Public Scan
Submitted URL: https://www.veritas.com/content/support/en_US/security/VTS16-001.html
Effective URL: https://www.veritas.com/content/support/en_US/security/VTS16-001
Submission: On January 20 via api from IN — Scanned from DE
Effective URL: https://www.veritas.com/content/support/en_US/security/VTS16-001
Submission: On January 20 via api from IN — Scanned from DE
Form analysis
1 forms found in the DOMjavascript:;
<form id="form_SignIn" action="javascript:;">
<div class="row">
<div class="col-12 errcl">
<div class="alert alert-danger error-signin" role="alert" id="loginerror"> Sign in failed. Please try again. </div>
</div>
<div class="col-12">
<!-- Username -->
<div class="md-form mt-3">
<input type="text" id="signIn_Username" name="signIn_Username" class="form-control" placeholder=" ">
<label for="signIn_Username" class="active">Username</label>
</div>
</div>
<div class="col-12">
<!-- Password -->
<div class="md-form mt-3">
<input type="password" id="signIn_Password" name="signIn_Password" class="form-control mb-0" placeholder=" " autocomplete="off">
<label for="signIn_Password" class="active">Password</label>
<a href="https://www.veritas.com/support/en/reset_password?returnURL=https://www.veritas.com/support/en"><small class="form-text">Forgot Password</small></a>
</div>
</div>
<div class="col-12">
<div class="custom-control custom-checkbox mb-5 pl-0">
<input type="checkbox" class="form-check-input filled-in" id="check_RememberMe" name="check_RememberMe">
<label class="custom-control-label" for="check_RememberMe">Remember me</label>
</div>
</div>
<!-- <div class="col-12">
<div class="md-select-wrapper">
<select id="language-selector-login" class="mdb-select md-form md-selected" onchange="onChangeLanguageSelector(this.value);">
<sly data-sly-list.items=>
<option class="option" value=""></option>
</sly>
</select>
<label>languageLabel</label>
</div>
</div>
-->
<div class="col-12">
<hr>
<p class="mt-5"> Don’t have an account? <a href="https://www.veritas.com/support/en_US/register?returnURL=https://www.veritas.com/support/en_US" class="ml-2">Create One</a>.</p>
</div>
<div class="col-12 sld-footer p-1">
<button id="btnSignInCancel" class="btn btn-secondary waves-effect waves-light">Cancel</button>
<button id="btn-SignIn" class="btn btn-primary waves-effect waves-light" disabled="">Sign In</button>
</div>
</div>
</form>
Text Content
* Veritas.com * VOX * Get Support * My Support Cases * Create Case * Start Chat * Call Us * -------------------------------------------------------------------------------- * Learn more about Veritas * Language * 简体中文 * English * Français * Deutsch * Italiano * 日本語 * 한국어 * Português * Español * * My Profile * Sign Out * Sign In Support * Products * Knowledge Base * Documentation * Downloads * Licensing * NetInsights * NetInsights Console * Netinsights Status * NetInsights * NetInsights Console * Netinsights Status Sign In Sign in failed. Please try again. Username Password Forgot Password Remember me -------------------------------------------------------------------------------- Don’t have an account? Create One. Cancel Sign In RESETPASSWORD oldPassword passwordRules newPassword confirmNewPassword regCancelButton changePassword Hello! We noticed that while you have a Veritas Account, you aren't yet registered to manage cases and use chat. Contact us for help registering your account regContactUsButton regCancelButton Support / Security Alerts 1. / VTS16-001: NetBackup Remote Access Vulnerabilities REVISIONS Last updated May 19, 2016 1.0.1: Added links to NVD entries for CVEs SEVERITY CVSS2 Base Score Impact Exploitability CVSS2 Vector Communications Protocol Remote Command Execution 9.3 10 8.6 AV:N/AC:M/Au:N/C:C/I:C/A:C Weak Key Exchange Exposure 7.9 10 5.5 AV:A/AC:M/Au:N/C:C/I:C/A:C Management Services Allow Unauthorized RPC 9.3 10 8.6 AV:N/AC:M/Au:N/C:C/I:C/A:C OVERVIEW Multiple vulnerabilities have been identified in Veritas (formerly Symantec) NetBackup Master/ Media Servers and clients. An attacker, able to successfully access a vulnerable NetBackup host, could potentially execute arbitrary commands or operations resulting in possible unauthorized, privileged access to the targeted system. AFFECTED PRODUCTS Product Version Solution(s) Veritas NetBackup 7.7.1, 7.6.1.x, 7.6.0.x, 7.5.x.x, 7.1.x, 7.0.x Upgrade to Veritas NetBackup 7.7.2 or apply security hotfix for 7.7, 7.6.1.2, 7.6.0.4, 7.5.0.7 as a minimum Veritas NetBackup Appliance 2.7.1, 2.6.1.x, 2.6.0.x, 2.5.x, 2.0.x, 1.2.x, 1.1.x Upgrade to Veritas NetBackup Appliance 2.7.2 or apply security hotfix for 2.6.1.2, 2.6.0.4, 2.5.4 as a minimum. Details Veritas (formerly Symantec) was notified of multiple security issues impacting NetBackup Appliance, Master servers, Media servers and Clients. CVE-2015-6550: An attacker, familiar with the communications protocols used by NetBackup, can leverage access to a host. Once access is obtained, the bpcd service fails to properly sanitize user input resulting in the potential to run arbitrary commands on the targeted system with privileged access. CVE-2015-6551: Communications between the administration console and the NBU server is not sufficiently protected. An attacker with access to the internal network, who is able to sniff network traffic, could capture and recover login credentials. This could potentially lead to full privileged access to the targeted server. NOTE: NetBackup 7.6.1 (Appliance 2.6.1) and above uses TLS to protect login communications and is NOT impacted by this particular issue. CVE-2015-6552: An attacker, with working knowledge of the NetBackup management services protocol and access to the network, could make any supported Remote Procedure Call (RPC) and fully compromise the NetBackup administration functionality. It is recommended that Veritas NetBackup listening ports should not be visible to the external network. Any attempt to exploit these would require internal network access either by an authorized network user or an external attacker able to gain unauthorized access to the network. Veritas Response Veritas engineers verified these issues and resolved them in Veritas NetBackup hotfixes to recent releases as identified in the affected products matrix above. Customers should upgrade and apply available hotfixes to avoid potential incidents of this nature. Veritas is not aware of exploitation of or adverse customer impact from these issues. Additional details and access to Veritas NetBackup security hotfixes are available from: https://www.veritas.com/docs/000108183 Best Practices As part of normal best practices, Veritas recommends that customers: * Restrict access of administration or management systems to privileged users. * Restrict remote access, if required, to trusted/authorized systems only. * Keep all operating systems and applications updated with the latest vendor patches. * Follow a multi-layered approach to security. Run both firewall and anti-malware applications, at a minimum, to provide multiple points of detection and protection to both inbound and outbound threats. * Deploy network and host-based intrusion detection systems to monitor network traffic for signs of anomalous or suspicious activity. This may aid in detection of attacks or malicious activity related to exploitation of latent vulnerabilities Credit Veritas would like to thank Emilien Girault, with ANSSI, working through CERT-FR for reporting these issues and coordinating with us as we resolved it. References CVE: These issues are candidates for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems. CVE Description CVE-2015-6550 Communications Protocol Remote Command Execution CVE-2015-6551 Weak Key Exchange Exposure CVE-2015-6552 Management Services Allow Unauthorized RPC Disclaimer THE SECURITY ADVISORY IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. Veritas CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. Veritas Technologies LLC 500 East Middlefield Road Mountain View, CA 94043 http://www.veritas.com/ © 2016 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas Logo, and NetBackup are trademarks or registered trademarks of Veritas Technologies LLC or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. © 2022 Veritas Contact Us Privacy Policy Legal User Agreement