CVE-2018-1163

9.8 CRITICAL

📋 TL;DR

CVE-2018-1163 is an authentication bypass vulnerability in Quest NetVault Backup that allows remote attackers to bypass authentication by manipulating the checksession parameter in JSON RPC requests. This affects organizations running vulnerable versions of NetVault Backup, potentially allowing attackers to execute arbitrary code with SYSTEM privileges.

💻 Affected Systems

Products:
  • Quest NetVault Backup
Versions: 11.2.0.13 and likely earlier versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the JSON RPC request handling component, which is enabled by default in NetVault Backup installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote unauthenticated attacker gains SYSTEM-level code execution, leading to complete system compromise, data theft, ransomware deployment, or lateral movement across the network.

🟠

Likely Case

Attackers bypass authentication to access backup data, modify backup configurations, or use this vulnerability as part of a chain to achieve code execution.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the backup server itself without lateral movement capabilities.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

ZDI published details and proof-of-concept. The vulnerability can be exploited without authentication and requires minimal technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.3.0.12 or later

Vendor Advisory: https://support.quest.com/netvault-backup/kb/293038/netvault-backup-security-vulnerability-notification

Restart Required: Yes

Instructions:

1. Download the latest NetVault Backup version from Quest support portal. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart the NetVault Backup service.

🔧 Temporary Workarounds

Network Access Restriction

windows

Restrict network access to NetVault Backup management interface to trusted IP addresses only

Use Windows Firewall: netsh advfirewall firewall add rule name="Block NetVault" dir=in action=block protocol=TCP localport=20031 remoteip=any
Use local firewall to restrict port 20031/TCP

JSON RPC Service Disable

windows

Disable the vulnerable JSON RPC service if not required

sc stop "NetVault Backup Service"
sc config "NetVault Backup Service" start= disabled

🧯 If You Can't Patch

  • Implement strict network segmentation: Isolate NetVault Backup servers from internet and restrict internal access to backup administrators only.
  • Enable detailed logging and monitoring for authentication bypass attempts and unusual JSON RPC requests.

🔍 How to Verify

Check if Vulnerable:

Check NetVault Backup version: If version is 11.2.0.13 or earlier, the system is vulnerable. Test by attempting to access JSON RPC endpoints without valid authentication.

Check Version:

In NetVault Backup Web Interface: Navigate to Help → About, or check installed programs in Windows Control Panel

Verify Fix Applied:

Verify NetVault Backup version is 11.3.0.12 or later. Test authentication bypass attempts should fail after patch installation.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful JSON RPC requests
  • Unusual checksession parameter values in JSON RPC logs
  • Authentication bypass events in NetVault audit logs

Network Indicators:

  • Unusual JSON RPC requests to port 20031/TCP from unauthorized sources
  • Authentication bypass patterns in HTTP traffic to NetVault management interface

SIEM Query:

source="netvault.log" AND ("checksession" OR "JSON RPC") AND ("authentication bypass" OR "invalid session")

🔗 References

📤 Share & Export