Security

You patch my back(up) and I'll patch yours... Arcserve bugs burrow remotely exploited holes in UDP storage systems

Updates urged for serious web services vulnerabilities


Companies running Arcserve Unified Data Protection to manage their backups and archives are being advised to update their software after bug hunters discovered four remotely exploitable security vulnerabilities.

Researchers with Digital Defense identified this month four holes that, if exploited via a phishing attack or malicious webpage, would allow an attacker to lift credentials or access data stored in the UDP data archiving and recovery system via its web services components.

The Digital Defense crew said the bug bundle consists of two different information disclosure flaws (one in /gateway/services/EdgeServiceImpl and the other via /UDPUpdates/Config/FullUpdateSettings.xml), a cross-site scripting vulnerability (in /authenticationendpoint/domain.jsp), and an XML External Entity flaw that could allow data disclosure via /management/UdpHttpService.

F5: Don't panic but folks can slip past vulnerable firewall servers, thanks to libssh's credentials-optional 'security'

READ MORE

"The vulnerabilities can open the door for potential compromise of sensitive data through access to credentials, phishing attacks and the ability for a hacker to read files without authentication from the hosting system," Digital Defense explained.

The vulnerabilities are only present in the Web Services components of the UDP Console and UDP Gateway – the two tools used by admins to access and manage backup archives. Machines running the UDP Recovery Point Server and UDP Agent software are not affected.

Fortunately for Arcserve customers, Digital Defense said it privately disclosed the vulnerability, and Arcserve has already put out a patch. Those running UDP 6.5 Update 4 and Update 3 can download the fixes firectly from Arcserve, while companies using UDP on a standalone gateway will still need to manually install the patch on those boxes. ®

Send us news
2 Comments

Delinea Secret Server customers should apply latest patches

Attackers could nab an org's most sensitive keys if left unaddressed

AWS must pay $525M to cloud storage patent holder, says jury

Computing giant will appeal ruling, which found infringement was not 'willful'

Backblaze cloud storage buzzes with added Event Notifications

If you want open system to automate workflows over platform of your choosing, join the queue

CISA in a flap as Chirp smart door locks can be trivially unlocked remotely

Hard-coded credentials last thing you want in home security app

Exploit code for Palo Alto Networks zero-day now public

Race on to patch as researchers warn of mass exploitation of directory traversal bug

Rust rustles up fix for 10/10 critical command injection bug on Windows in std lib

BatBadBut hits Erlang, Go, Python, Ruby as well

Snowmobile, Amazon's truck-powered migration service, reaches the end of the road

Demand for bulk storage on wheels turned out to be wan

AI boom is boosting demand even for HDDs, raising prices by up to 20% since Q3

No computer part, even spinning rust, is safe from the hype cycle

San Francisco's light rail to upgrade from floppy disks

What is it with Fog City and ancient transport tech?

Hotel check-in terminal bug spews out access codes for guest rooms

Attacks could be completed in seconds, compromising customer safety

Ivanti commits to secure-by-design overhaul after vulnerability nightmare

CEO addresses whirlwind start to 2024 and how it plans to prevent a repeat

Samsung enterprise SSD prices skyrocket thanks to AI's appetite for storage

Consumer-grade devices won't be hit as hard