CVE-2021-27876
📋 TL;DR
CVE-2021-27876 is an authentication bypass vulnerability in Veritas Backup Exec Agent that allows attackers to gain unauthorized access and execute arbitrary commands with System privileges. This affects Veritas Backup Exec versions before 21.2. Attackers can read arbitrary files on the system after bypassing SHA authentication.
💻 Affected Systems
- Veritas Backup Exec
📦 What is this software?
Backup Exec by Veritas
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with SYSTEM privileges, allowing file access, data exfiltration, and potential ransomware deployment across the backup infrastructure.
Likely Case
Unauthorized access to sensitive backup data, configuration files, and potential lateral movement within the network using compromised backup credentials.
If Mitigated
Limited impact if network segmentation isolates backup systems and proper authentication controls are in place.
🎯 Exploit Status
Public exploit code available on Packet Storm. CISA has added this to their Known Exploited Vulnerabilities catalog, indicating active exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 21.2 and later
Vendor Advisory: https://www.veritas.com/content/support/en_US/security/VTS21-001
Restart Required: Yes
Instructions:
1. Download Backup Exec 21.2 or later from Veritas support portal. 2. Install the update on all Backup Exec servers and agents. 3. Restart all Backup Exec services. 4. Verify agent communication is functioning properly.
🔧 Temporary Workarounds
Network Segmentation
allIsolate Backup Exec servers and agents from untrusted networks using firewall rules.
Disable SHA Authentication
windowsConfigure Backup Exec to use only TLS authentication for agent communication.
🧯 If You Can't Patch
- Implement strict network access controls to limit Backup Exec Agent communication to trusted IP addresses only.
- Monitor for unusual authentication attempts or file access patterns from Backup Exec Agent processes.
🔍 How to Verify
Check if Vulnerable:
Check Backup Exec version in the console: Help > About Backup Exec. If version is below 21.2, the system is vulnerable.
Check Version:
In Backup Exec console: Help > About Backup Exec
Verify Fix Applied:
Verify version is 21.2 or higher and test agent authentication using only TLS protocols.
📡 Detection & Monitoring
Log Indicators:
- Failed authentication attempts followed by successful authentication from unusual IPs
- Unusual file access patterns by Backup Exec Agent service
Network Indicators:
- Unusual network traffic to Backup Exec Agent port (typically 10000)
- Authentication attempts bypassing TLS
SIEM Query:
source="backup_exec" AND (event_type="authentication" AND result="success" AND protocol!="TLS") OR (process="bedag.exe" AND file_access="*system*" AND user="SYSTEM")
🔗 References
- http://packetstormsecurity.com/files/168506/Veritas-Backup-Exec-Agent-Remote-Code-Execution.html
- https://www.veritas.com/content/support/en_US/security/VTS21-001#issue2
- http://packetstormsecurity.com/files/168506/Veritas-Backup-Exec-Agent-Remote-Code-Execution.html
- https://www.veritas.com/content/support/en_US/security/VTS21-001#issue2
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-27876