CVE-2023-38404

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to upload arbitrary files to Veritas InfoScale Operations Manager servers, which can then be executed to achieve remote command execution. It affects VIOM installations before version 8.0.0.410. Organizations using vulnerable versions are at risk of server compromise.

💻 Affected Systems

Products:
  • Veritas InfoScale Operations Manager (VIOM)
Versions: All versions before 8.0.0.410
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the XPRTLD web application component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover with administrative privileges, data exfiltration, lateral movement to other systems, and persistent backdoor installation.

🟠

Likely Case

Unauthorized file upload leading to command execution, potentially compromising the VIOM server and accessing sensitive management data.

🟢

If Mitigated

Limited impact due to network segmentation, strict file upload validation, and proper authentication controls preventing exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authentication is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.0.0.410 or later

Vendor Advisory: https://www.veritas.com/content/support/en_US/security/VTS23-009

Restart Required: Yes

Instructions:

1. Download VIOM version 8.0.0.410 or later from Veritas support portal. 2. Backup current configuration. 3. Apply the update following Veritas upgrade documentation. 4. Restart VIOM services.

🔧 Temporary Workarounds

Restrict file upload types

all

Configure web application firewall or server-side validation to block upload of executable file types.

Network segmentation

all

Isolate VIOM servers from production networks and restrict access to authenticated users only.

🧯 If You Can't Patch

  • Implement strict access controls and multi-factor authentication for VIOM administrative accounts
  • Deploy web application firewall with file upload filtering and monitor for suspicious upload attempts

🔍 How to Verify

Check if Vulnerable:

Check VIOM version via web interface or command line. Versions below 8.0.0.410 are vulnerable.

Check Version:

On VIOM server: viom version or check web interface administration panel

Verify Fix Applied:

Confirm version is 8.0.0.410 or higher and test file upload functionality with restricted file types.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to XPRTLD web application
  • Execution of unexpected processes from upload directories
  • Authentication logs showing suspicious access patterns

Network Indicators:

  • HTTP POST requests with file uploads to VIOM web interface
  • Outbound connections from VIOM server to unexpected destinations

SIEM Query:

source="viom" AND (event="file_upload" OR event="process_execution") AND file_extension IN ("exe", "sh", "bat", "php", "jsp")

🔗 References

📤 Share & Export