Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-36164

CVSS 9.3 · Critical EPSS 0.05% · P15
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-36164

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered in Veritas Enterprise Vault through 14.0. On start-up, it loads the OpenSSL library. The OpenSSL library then attempts to load the openssl.cnf configuration file (which does not exist) at the following locations in both the System drive (typically C:\) and the product's installation drive (typically not C:\): \Isode\etc\ssl\openssl.cnf (on SMTP Server) or \user\ssl\openssl.cnf (on other affected components). By default, on Windows systems, users can create directories under C:\. A low privileged user can create a openssl.cnf configuration file to load a malicious OpenSSL engine, resulting in arbitrary code execution as SYSTEM when the service starts. This gives the attacker administrator access on the system, allowing the attacker (by default) to access all data, access all installed applications, etc. This vulnerability only affects a server with MTP Server, SMTP Archiving IMAP Server, IMAP Archiving, Vault Cloud Adapter, NetApp File server, or File System Archiving for NetApp as File Server.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Veritas Enterprise Vault 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Veritas Enterprise Vault是美国Veritas公司的一款企业级文件保护、归档自动化软件。 Veritas Enterprise Vault 版本 14.0 及之前版本存在安全漏洞,该漏洞允许低特权用户可以创建openssl.cnff配置文件来加载OpenSSL engine。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-36164

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-36164

登录查看更多情报信息。

Same Patch Batch · n/a · 2021-01-06 · 53 CVEs total

CVE-2020-361689.3 CRITICALVeritas Resiliency Platform 安全漏洞
CVE-2020-361679.3 CRITICALVeritas Backup Exec 代码问题漏洞
CVE-2020-361669.3 CRITICAL多款Veritas产品安全漏洞
CVE-2020-361659.3 CRITICALVeritas Desktop and Laptop Option 访问控制错误漏洞
CVE-2020-361639.3 CRITICALVeritas NetBackup Opscenter 安全漏洞
CVE-2020-361629.3 CRITICALVeritas CloudPoint 安全漏洞
CVE-2020-361699.3 CRITICALVeritas NetBackup和Veritas NetBackup Opscenter 访问控制错误漏洞
CVE-2020-361609.3 CRITICALVeritas System Recovery 安全漏洞
CVE-2020-36183FasterXML jackson-databind 代码问题漏洞
CVE-2019-16954SolarWinds Web Help Desk 注入漏洞
CVE-2020-35262Digisol Systems DG-HR3400 跨站脚本漏洞
CVE-2020-8264Rails 跨站脚本漏洞
CVE-2020-8280Nextcloud 跨站脚本漏洞
CVE-2020-8274Citrix Secure Mail For Android 代码注入漏洞
CVE-2020-8275Citrix Secure Mail For Android 访问控制错误漏洞
CVE-2020-8281Nextcloud 跨站脚本漏洞
CVE-2020-36178Tp-link TL-WR840N 操作系统命令注入漏洞
CVE-2020-29041Web-Sesame 安全漏洞
CVE-2019-16962ZOHO ManageEngine Desktop Central 注入漏洞
CVE-2020-36179FasterXML jackson-databind 代码问题漏洞

Showing top 20 of 53 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-36164

No comments yet


Leave a comment