CVE-2022-36985

7.8 HIGH

📋 TL;DR

CVE-2022-36985 is a local privilege escalation vulnerability in Veritas NetBackup that allows attackers with unprivileged local access to Windows NetBackup Primary servers to gain elevated privileges. This affects NetBackup 8.1.x through 8.1.2, 8.2, 8.3.x through 8.3.0.2, 9.x through 9.0.0.1, and 9.1.x through 9.1.0.1. Attackers could potentially compromise the entire backup infrastructure.

💻 Affected Systems

Products:
  • Veritas NetBackup
  • NetBackup Appliance
  • NetBackup Flex Appliance
Versions: 8.1.x through 8.1.2, 8.2, 8.3.x through 8.3.0.2, 9.x through 9.0.0.1, and 9.1.x through 9.1.0.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows NetBackup Primary servers. Other NetBackup components and Linux systems are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the NetBackup Primary server, allowing attackers to access, modify, or delete backup data, disrupt backup operations, and potentially pivot to other systems in the environment.

🟠

Likely Case

Local attackers gain administrative privileges on the NetBackup server, enabling them to access sensitive backup data and potentially compromise other systems through stored credentials.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access controls, and monitoring are in place to detect and contain local privilege escalation attempts.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the Windows server.
🏢 Internal Only: HIGH - Any user with local access to vulnerable NetBackup Primary servers could potentially exploit this to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access to the Windows server. The vulnerability is in how NetBackup handles certain operations, allowing privilege escalation through standard user interactions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply the latest cumulative update for your NetBackup version as specified in VTS22-004

Vendor Advisory: https://www.veritas.com/content/support/en_US/security/VTS22-004

Restart Required: Yes

Instructions:

1. Review VTS22-004 advisory for specific patch versions. 2. Download appropriate cumulative update from Veritas support portal. 3. Apply patch following Veritas documentation. 4. Restart NetBackup services and verify functionality.

🔧 Temporary Workarounds

Restrict Local Access

windows

Limit local access to NetBackup Primary servers to only authorized administrators

Implement Least Privilege

windows

Ensure all user accounts on NetBackup servers have only necessary privileges

🧯 If You Can't Patch

  • Implement strict access controls to limit who can log in locally to NetBackup Primary servers
  • Enable detailed auditing and monitoring of local privilege escalation attempts and suspicious activities

🔍 How to Verify

Check if Vulnerable:

Check NetBackup version via the NetBackup Administration Console or by examining installed software in Windows Control Panel

Check Version:

Check NetBackup version in Administration Console or via 'wmic product get name,version' for installed Veritas products

Verify Fix Applied:

Verify patch installation through Windows Update history or installed programs list, then confirm NetBackup version is no longer in affected range

📡 Detection & Monitoring

Log Indicators:

  • Windows Security logs showing privilege escalation events
  • NetBackup logs showing unusual administrative activities from non-admin accounts
  • Event ID 4672 (Special privileges assigned to new logon) from unexpected users

Network Indicators:

  • Unusual administrative connections to NetBackup servers
  • Unexpected backup job modifications or deletions

SIEM Query:

source="windows_security" event_id=4672 AND user NOT IN (admin_users_list) AND process_name CONTAINS "netbackup"

🔗 References

📤 Share & Export