CVE-2020-37045

7.8 HIGH

📋 TL;DR

CVE-2020-37045 is an unquoted service path vulnerability in Veritas NetBackup 7.0's INET Daemon service. This allows local attackers to place malicious executables in paths that Windows will execute with elevated LocalSystem privileges when the service starts. Only systems running the vulnerable NetBackup version with local access are affected.

💻 Affected Systems

Products:
  • Veritas NetBackup
Versions: 7.0 (specific patch level not specified in CVE)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations due to Windows service path handling. Requires local access to write files to vulnerable paths.

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via arbitrary code execution with LocalSystem privileges, enabling complete control over the Windows system, credential theft, and lateral movement.

🟠

Likely Case

Local privilege escalation allowing attackers to gain SYSTEM-level access on the compromised host, potentially leading to persistence mechanisms and further network exploitation.

🟢

If Mitigated

Limited impact if proper access controls prevent local users from writing to affected directories and service restart monitoring is in place.

🌐 Internet-Facing: LOW - This requires local access to the system; direct internet exploitation is not possible.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts with local access can exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access to create malicious executables in unquoted path locations. Public exploit code exists on Exploit-DB.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Veritas advisory for specific patched versions

Vendor Advisory: https://www.veritas.com/

Restart Required: Yes

Instructions:

1. Check Veritas security advisory for specific patch. 2. Apply the official patch from Veritas. 3. Restart the NetBackup INET Daemon service. 4. Verify the service path is now properly quoted.

🔧 Temporary Workarounds

Add quotes to service path

windows

Manually edit the service path in Windows Registry to include quotes around the full executable path

sc config "NetBackup INET Daemon" binPath= "\"C:\Program Files\Veritas\NetBackup\bin\bpinetd.exe\""

Restrict directory permissions

windows

Set strict ACLs on parent directories to prevent unauthorized file creation

icacls "C:\Program Files\Veritas\NetBackup\bin" /deny Users:(OI)(CI)W

🧯 If You Can't Patch

  • Implement strict access controls on C:\Program Files\Veritas\NetBackup\ and subdirectories to prevent unauthorized file creation
  • Monitor for unexpected service restarts or file creation in NetBackup directories using file integrity monitoring

🔍 How to Verify

Check if Vulnerable:

Check if the NetBackup INET Daemon service path is unquoted: sc qc "NetBackup INET Daemon" | findstr BINARY_PATH_NAME

Check Version:

Check NetBackup version via administration console or registry: reg query "HKLM\SOFTWARE\Veritas\NetBackup\CurrentVersion" /v DisplayVersion

Verify Fix Applied:

Verify service path now has quotes: sc qc "NetBackup INET Daemon" should show "C:\Program Files\Veritas\NetBackup\bin\bpinetd.exe" in quotes

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing unexpected service restarts (Event ID 7036)
  • Security logs showing file creation in NetBackup directories by non-administrative users

Network Indicators:

  • Unusual outbound connections from NetBackup server following service restart

SIEM Query:

EventID=7036 AND ServiceName="NetBackup INET Daemon" | join (EventID=4688 AND NewProcessName contains "bpinetd")

🔗 References

📤 Share & Export