CVE-2022-36951
📋 TL;DR
CVE-2022-36951 is an unauthenticated remote code execution vulnerability in Veritas NetBackup OpsCenter that allows attackers to compromise the host by exploiting an incorrectly patched previous vulnerability. This affects organizations running vulnerable versions of NetBackup OpsCenter, particularly those with internet-facing instances. The vulnerability stems from incomplete patching of a previous security issue.
💻 Affected Systems
- Veritas NetBackup OpsCenter
📦 What is this software?
Netbackup by Veritas
Netbackup by Veritas
Netbackup by Veritas
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attacker to execute arbitrary code with highest privileges, potentially leading to data theft, ransomware deployment, or lateral movement across the network.
Likely Case
Remote code execution leading to installation of backdoors, credential harvesting, or deployment of malware on the affected NetBackup OpsCenter server.
If Mitigated
Limited impact due to network segmentation, proper access controls, and monitoring that detects exploitation attempts before successful compromise.
🎯 Exploit Status
Given the high CVSS score and unauthenticated nature, exploitation tools are likely to be developed or already exist in attacker toolkits.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 8.3.0.3, 9.0.0.2, 9.1.0.2, and 10.0.0.1
Vendor Advisory: https://www.veritas.com/content/support/en_US/security/VTS22-009#Issue2
Restart Required: Yes
Instructions:
1. Download the appropriate patch from Veritas support portal. 2. Apply the patch following Veritas documentation. 3. Restart the NetBackup OpsCenter service. 4. Verify the patch was successfully applied.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to NetBackup OpsCenter to only trusted management networks
Firewall Rules
allImplement strict firewall rules to block external access to NetBackup OpsCenter ports
🧯 If You Can't Patch
- Immediately isolate the NetBackup OpsCenter server from internet access
- Implement strict network segmentation and monitor for any suspicious activity
🔍 How to Verify
Check if Vulnerable:
Check NetBackup OpsCenter version against affected versions list. If version falls within affected ranges, system is vulnerable.
Check Version:
Check version through NetBackup OpsCenter web interface or consult Veritas documentation for version checking commands
Verify Fix Applied:
Verify NetBackup OpsCenter version is updated to patched versions: 8.3.0.3, 9.0.0.2, 9.1.0.2, or 10.0.0.1
📡 Detection & Monitoring
Log Indicators:
- Unusual process creation events
- Suspicious network connections from OpsCenter server
- Authentication bypass attempts in logs
Network Indicators:
- Unexpected outbound connections from OpsCenter server
- Traffic patterns indicating exploitation attempts
SIEM Query:
Example: source="netbackup-opscenter" AND (event_type="process_creation" OR event_type="network_connection") AND severity=HIGH