Filtered by vendor Veritas Subscriptions
Filtered by product System Recovery Subscriptions
Total 5 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-35204 1 Veritas 1 System Recovery 2024-11-21 8.4 High
Veritas System Recovery before 23.3_Hotfix has incorrect permissions for the Veritas System Recovery folder, and thus low-privileged users can conduct attacks.
CVE-2022-41320 1 Veritas 1 System Recovery 2024-11-21 6.5 Medium
Veritas System Recovery (VSR) versions 18 and 21 store a network destination password in the Windows registry during configuration of the backup configuration. This vulnerability could provide a Windows user (who has sufficient privileges) to access a network file system that they were not authorized to access.
CVE-2022-26778 1 Veritas 1 System Recovery 2024-11-21 5.3 Medium
Veritas System Recovery (VSR) 18 and 21 stores a network destination password in the Windows registry during configuration of the backup configuration. This could allow a Windows user (who has sufficient privileges) to access a network file system that they were not authorized to access.
CVE-2020-36160 2 Microsoft, Veritas 2 Windows, System Recovery 2024-11-21 9.3 Critical
An issue was discovered in Veritas System Recovery before 21.2. On start-up, it loads the OpenSSL library from \usr\local\ssl. This library attempts to load the from \usr\local\ssl\openssl.cnf configuration file, which does not exist. By default, on Windows systems, users can create directories under C:\. A low privileged user can create a C:\usr\local\ssl\openssl.cnf configuration file to load a malicious OpenSSL engine, resulting in arbitrary code execution as SYSTEM when the service starts. This gives the attacker administrator access on the system, allowing the attacker (by default) to access all data and installed applications, etc. If the system is also an Active Directory domain controller, then this can affect the entire domain.
CVE-2017-7444 1 Veritas 1 System Recovery 2024-11-21 N/A
In Veritas System Recovery before 16 SP1, there is a DLL hijacking vulnerability in the patch installer if an attacker has write access to the directory from which the product is executed.