Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-36166

CVSS 9.3 · Critical EPSS 0.05% · P15
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-36166

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered in Veritas InfoScale 7.x through 7.4.2 on Windows, Storage Foundation through 6.1 on Windows, Storage Foundation HA through 6.1 on Windows, and InfoScale Operations Manager (aka VIOM) Windows Management Server 7.x through 7.4.2. On start-up, it loads the OpenSSL library from \usr\local\ssl. This library attempts to load the \usr\local\ssl\openssl.cnf configuration file, which may not exist. On Windows systems, this path could translate to <drive>:\usr\local\ssl\openssl.cnf, where <drive> could be the default Windows installation drive such as C:\ or the drive where a Veritas product is installed. By default, on Windows systems, users can create directories under any top-level directory. A low privileged user can create a <drive>:\usr\local\ssl\openssl.cnf configuration file to load a malicious OpenSSL engine, resulting in arbitrary code execution as SYSTEM when the service starts. This gives the attacker administrator access on the system, allowing the attacker (by default) to access all data, access all installed applications, etc.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
多款Veritas产品安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Veritas Infoscale等都是美国Veritas公司的产品。Veritas Infoscale是一款高可用虚拟化存储软件。Veritas Foundation For Windows是一款备份、存储管理软件。Veritas Foundation HA For Windows是一款备份、存储管理软件。 多款 Veritas 产品存在安全漏洞,该漏洞源于试图加载可能不存在的usrlocalsslopenssl.cnf配置文件。以下产品及型号会受到影响:Veritas InfoScale (Windo
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-36166

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-36166

登录查看更多情报信息。

Same Patch Batch · n/a · 2021-01-06 · 53 CVEs total

CVE-2020-361689.3 CRITICALVeritas Resiliency Platform 安全漏洞
CVE-2020-361679.3 CRITICALVeritas Backup Exec 代码问题漏洞
CVE-2020-361659.3 CRITICALVeritas Desktop and Laptop Option 访问控制错误漏洞
CVE-2020-361649.3 CRITICALVeritas Enterprise Vault 安全漏洞
CVE-2020-361639.3 CRITICALVeritas NetBackup Opscenter 安全漏洞
CVE-2020-361629.3 CRITICALVeritas CloudPoint 安全漏洞
CVE-2020-361699.3 CRITICALVeritas NetBackup和Veritas NetBackup Opscenter 访问控制错误漏洞
CVE-2020-361609.3 CRITICALVeritas System Recovery 安全漏洞
CVE-2020-36183FasterXML jackson-databind 代码问题漏洞
CVE-2019-16954SolarWinds Web Help Desk 注入漏洞
CVE-2020-35262Digisol Systems DG-HR3400 跨站脚本漏洞
CVE-2020-8264Rails 跨站脚本漏洞
CVE-2020-8280Nextcloud 跨站脚本漏洞
CVE-2020-8274Citrix Secure Mail For Android 代码注入漏洞
CVE-2020-8275Citrix Secure Mail For Android 访问控制错误漏洞
CVE-2020-8281Nextcloud 跨站脚本漏洞
CVE-2020-36178Tp-link TL-WR840N 操作系统命令注入漏洞
CVE-2020-29041Web-Sesame 安全漏洞
CVE-2019-16962ZOHO ManageEngine Desktop Central 注入漏洞
CVE-2020-36179FasterXML jackson-databind 代码问题漏洞

Showing top 20 of 53 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2020-36166

No comments yet


Leave a comment