Browse all 12 CVE security advisories affecting Arcserve. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Arcserve provides data protection and disaster recovery solutions for businesses, enabling backup, replication, and high availability of critical systems. Historically, their products have faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, often stemming from insufficient input validation and access controls. While no major public security incidents have been widely documented, the 12 recorded CVEs highlight potential risks in their software stack. Security researchers have identified flaws that could allow attackers to compromise systems or escalate privileges, underscoring the importance of regular patching for organizations relying on their platforms.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-0801 | Unauthenticated DoS in Arcserve Unified Data Protection — Unified Data Protection | 7.5 | High | 2024-03-13 |
| CVE-2024-0800 | Authentication Bypass via wizardLogin in Arcserve Unified Data Protection — Unified Data ProtectionCWE-434 | 8.8 | High | 2024-03-13 |
| CVE-2024-0799 | Authentication Bypass via wizardLogin in Arcserve Unified Data Protection — Unified Data ProtectionCWE-287 | 9.8 | Critical | 2024-03-13 |
This page lists every published CVE security advisory associated with Arcserve. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.