CVE-2021-27878
📋 TL;DR
CVE-2021-27878 is an authentication bypass vulnerability in Veritas Backup Exec's SHA authentication scheme that allows attackers to gain unauthorized access to the agent. Once authenticated, attackers can execute arbitrary commands with system privileges through data management protocol commands. This affects Veritas Backup Exec installations before version 21.2.
💻 Affected Systems
- Veritas Backup Exec
📦 What is this software?
Backup Exec by Veritas
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with complete administrative control, data exfiltration, ransomware deployment, and lateral movement across the network.
Likely Case
Unauthorized access to backup systems leading to data theft, backup corruption, or deployment of malware on affected systems.
If Mitigated
Limited impact with proper network segmentation and access controls preventing lateral movement and limiting blast radius.
🎯 Exploit Status
Exploitation requires network access to the Backup Exec agent port (typically 10000/TCP). The vulnerability is in the authentication handshake, allowing bypass of SHA authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 21.2 and later
Vendor Advisory: https://www.veritas.com/content/support/en_US/security/VTS21-001#issue3
Restart Required: Yes
Instructions:
1. Download Backup Exec 21.2 or later from Veritas support portal. 2. Apply the update to all Backup Exec servers and agents. 3. Restart Backup Exec services. 4. Verify all agents are updated and communicating properly.
🔧 Temporary Workarounds
Network Segmentation
allRestrict access to Backup Exec agent ports (typically 10000/TCP) to only trusted Backup Exec servers.
Windows Firewall: New-NetFirewallRule -DisplayName "Block BackupExec Agent" -Direction Inbound -LocalPort 10000 -Protocol TCP -Action Block
Linux iptables: iptables -A INPUT -p tcp --dport 10000 -j DROP
Disable SHA Authentication
windowsConfigure Backup Exec to use only TLS-based authentication methods instead of SHA authentication scheme.
Backup Exec Console: Tools > Options > Security > Agent Authentication > Disable SHA Authentication
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Backup Exec systems from general network traffic
- Monitor for unusual authentication attempts or command execution on Backup Exec agent ports
🔍 How to Verify
Check if Vulnerable:
Check Backup Exec version: In Backup Exec console, go to Help > About. If version is below 21.2, system is vulnerable.
Check Version:
Windows: reg query "HKLM\SOFTWARE\Veritas\Backup Exec" /v Version
Verify Fix Applied:
Verify version is 21.2 or higher and test agent communication to ensure authentication is working properly.
📡 Detection & Monitoring
Log Indicators:
- Failed authentication attempts followed by successful authentication from unusual IPs
- Unusual data management protocol commands in Backup Exec logs
- System command execution from Backup Exec processes
Network Indicators:
- Unusual traffic to Backup Exec agent port (10000/TCP) from non-Backup Exec servers
- Authentication bypass patterns in network traffic
SIEM Query:
source="backup_exec.log" AND ("authentication bypass" OR "SHA auth failure" OR "unexpected command")
🔗 References
- http://packetstormsecurity.com/files/168506/Veritas-Backup-Exec-Agent-Remote-Code-Execution.html
- https://www.veritas.com/content/support/en_US/security/VTS21-001#issue3
- http://packetstormsecurity.com/files/168506/Veritas-Backup-Exec-Agent-Remote-Code-Execution.html
- https://www.veritas.com/content/support/en_US/security/VTS21-001#issue3
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-27878