CVE-2022-36987
📋 TL;DR
This vulnerability allows authenticated attackers on NetBackup Client systems to write arbitrary files to NetBackup Primary servers. This could lead to remote code execution, data manipulation, or system compromise. Affected are Veritas NetBackup versions 8.1.x through 8.1.2, 8.2, 8.3.x through 8.3.0.2, 9.x through 9.0.0.1, and 9.1.x through 9.1.0.1.
💻 Affected Systems
- Veritas NetBackup
- NetBackup Appliance
- NetBackup Flex Appliance
📦 What is this software?
Flex Scale by Veritas
Flex Scale by Veritas
Netbackup by Veritas
Netbackup by Veritas
Netbackup by Veritas
Netbackup by Veritas
Netbackup by Veritas
Netbackup by Veritas
Netbackup by Veritas
Netbackup by Veritas
Netbackup by Veritas
Netbackup by Veritas
⚠️ Risk & Real-World Impact
Worst Case
Full compromise of NetBackup Primary server leading to data destruction, ransomware deployment, or lateral movement to other systems in the environment.
Likely Case
Unauthorized file writes leading to data corruption, configuration changes, or privilege escalation on the backup server.
If Mitigated
Limited impact due to network segmentation, strict access controls, and monitoring preventing successful exploitation.
🎯 Exploit Status
Exploitation requires authenticated access to a NetBackup Client, making it accessible to internal attackers or compromised client systems.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply patches as specified in VTS22-004 advisory
Vendor Advisory: https://www.veritas.com/content/support/en_US/security/VTS22-004
Restart Required: Yes
Instructions:
1. Review VTS22-004 advisory for specific patch versions. 2. Apply appropriate patches to all affected NetBackup Primary servers. 3. Restart NetBackup services. 4. Verify patch installation.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access between NetBackup Clients and Primary servers to only necessary ports and protocols.
Access Control Hardening
allImplement strict authentication and authorization controls for NetBackup Client access.
🧯 If You Can't Patch
- Implement strict network segmentation between NetBackup Clients and Primary servers
- Enforce least privilege access controls and monitor for suspicious file write activities
🔍 How to Verify
Check if Vulnerable:
Check NetBackup version against affected ranges: 8.1.x-8.1.2, 8.2, 8.3.x-8.3.0.2, 9.x-9.0.0.1, 9.1.x-9.1.0.1
Check Version:
On NetBackup server: vxpbx_exchange -get_server_info | grep Version
Verify Fix Applied:
Verify patch installation by checking version is outside affected ranges and reviewing patch logs
📡 Detection & Monitoring
Log Indicators:
- Unexpected file write operations from client systems
- Unauthorized file modification attempts on Primary server
Network Indicators:
- Unusual file transfer patterns between clients and primary servers
SIEM Query:
source="netbackup_logs" AND (event="file_write" OR event="unauthorized_access") AND dest_host="primary_server"