CVE-2021-43037

7.8 HIGH

📋 TL;DR

CVE-2021-43037 is a privilege escalation vulnerability in Kaseya Unitrends Backup Appliance Windows agent due to insecure default permissions that allow DLL injection and binary planting. An unprivileged local user can exploit this to gain SYSTEM-level privileges. This affects organizations using vulnerable versions of the Kaseya Unitrends Backup Appliance.

💻 Affected Systems

Products:
  • Kaseya Unitrends Backup Appliance
Versions: All versions before 10.5.5
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Windows agent component of the backup appliance. Linux versions are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where an attacker gains full SYSTEM privileges, enabling installation of persistent malware, credential theft, lateral movement, and data destruction.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install additional malware, and access sensitive backup data.

🟢

If Mitigated

Limited impact if proper access controls and monitoring are in place, though the vulnerability still provides a foothold for attackers.

🌐 Internet-Facing: LOW with brief explanation
🏢 Internal Only: HIGH with brief explanation

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system. Detailed exploitation techniques have been publicly documented in security blogs.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.5.5

Vendor Advisory: https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961

Restart Required: Yes

Instructions:

1. Download and install Kaseya Unitrends Backup Appliance version 10.5.5 or later from the Kaseya portal. 2. Apply the update to all affected Windows agents. 3. Restart the backup services or the entire system as required.

🔧 Temporary Workarounds

Restrict File Permissions

windows

Manually adjust file permissions on the vulnerable directories to prevent unprivileged users from writing DLL files.

icacls "C:\Program Files\Unitrends\" /deny Users:(OI)(CI)W
icacls "C:\ProgramData\Unitrends\" /deny Users:(OI)(CI)W

Remove Unnecessary User Access

windows

Remove local user accounts that don't require access to backup systems and implement least privilege principles.

🧯 If You Can't Patch

  • Implement strict access controls to limit who can log into systems running the vulnerable agent
  • Deploy endpoint detection and response (EDR) solutions to monitor for DLL injection attempts and privilege escalation activities

🔍 How to Verify

Check if Vulnerable:

Check the Unitrends agent version by navigating to the agent interface or checking the installed programs list for version numbers below 10.5.5.

Check Version:

wmic product where name="Unitrends" get version

Verify Fix Applied:

Verify the installed version is 10.5.5 or higher in the Unitrends management console or via the agent properties.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading from unusual locations
  • Security logs showing privilege escalation attempts
  • Application logs showing unexpected agent behavior

Network Indicators:

  • Unusual outbound connections from backup systems
  • Anomalous authentication patterns to backup appliances

SIEM Query:

EventID=4688 AND (ProcessName LIKE '%Unitrends%' OR CommandLine CONTAINS 'Unitrends') AND NewProcessName CONTAINS '.dll'

🔗 References

📤 Share & Export