CVE-2023-26258

9.8 CRITICAL

📋 TL;DR

Arcserve UDP backup software through version 9.0.6034 has an authentication bypass vulnerability where the getVersionInfo endpoint leaks an AuthUUID token. Attackers can use this token to obtain administrative sessions and execute arbitrary tasks. All Arcserve UDP installations up to 9.0.6034 are affected.

💻 Affected Systems

Products:
  • Arcserve UDP
Versions: Through 9.0.6034
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all default installations of Arcserve UDP up to the vulnerable version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code, access backup data, modify backup configurations, and potentially pivot to other systems.

🟠

Likely Case

Unauthorized administrative access leading to data theft, backup manipulation, and potential ransomware deployment.

🟢

If Mitigated

Limited impact if network segmentation prevents external access and proper monitoring detects unusual administrative activity.

🌐 Internet-Facing: HIGH - Directly exploitable without authentication via HTTP requests.
🏢 Internal Only: HIGH - Even internally, any user with network access can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP requests and has been publicly demonstrated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.0.6034_HF1 or later

Vendor Advisory: https://support.arcserve.com/s/article/KB000015720

Restart Required: Yes

Instructions:

1. Download the hotfix from Arcserve support portal. 2. Stop Arcserve UDP services. 3. Apply the hotfix. 4. Restart services. 5. Verify version is 9.0.6034_HF1 or later.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to Arcserve UDP web interface to trusted IPs only.

Configure firewall rules to block external access to TCP ports 8014, 8015, and 19000

Web Application Firewall

all

Block requests to vulnerable endpoints.

Add WAF rules to block requests to /WebServiceImpl/services/FlashServiceImpl and /WebServiceImpl/services/VirtualStandbyServiceImpl

🧯 If You Can't Patch

  • Isolate Arcserve UDP server from internet and restrict internal network access
  • Implement strict monitoring for unusual administrative activity and failed authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check if version is 9.0.6034 or earlier by accessing the web interface or checking installed version in Windows Programs.

Check Version:

Check Arcserve UDP version in Windows Control Panel > Programs and Features or via web interface login page.

Verify Fix Applied:

Verify version is 9.0.6034_HF1 or later and test that AuthUUID token is no longer exposed via getVersionInfo endpoint.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful administrative access
  • Unusual administrative tasks executed from unexpected IP addresses

Network Indicators:

  • HTTP requests to /WebServiceImpl/services/FlashServiceImpl?method=getVersionInfo followed by requests to VirtualStandbyServiceImpl

SIEM Query:

source="arcserve_udp" AND (uri="/WebServiceImpl/services/FlashServiceImpl" OR uri="/WebServiceImpl/services/VirtualStandbyServiceImpl")

🔗 References

📤 Share & Export