CVE-2023-41998
📋 TL;DR
Arcserve UDP versions before 9.2 contain an unauthenticated remote code execution vulnerability in the RPSService4CPMImpl interface. Attackers can upload and execute arbitrary files on affected systems, potentially gaining full control. Organizations using Arcserve UDP for backup and recovery are affected.
💻 Affected Systems
- Arcserve Unified Data Protection
📦 What is this software?
Udp by Arcserve
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to execute arbitrary code, steal sensitive backup data, deploy ransomware, or pivot to other network systems.
Likely Case
Attackers gain initial access to backup servers, potentially compromising backup integrity and using the system as a foothold for lateral movement.
If Mitigated
With proper network segmentation and access controls, impact is limited to the backup system itself without lateral movement capabilities.
🎯 Exploit Status
Tenable published technical details and proof-of-concept, making exploitation straightforward for attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 9.2 or later
Vendor Advisory: https://support.arcserve.com/s/article/000019995
Restart Required: Yes
Instructions:
1. Download Arcserve UDP 9.2 or later from official vendor portal. 2. Backup current configuration. 3. Install the update following vendor documentation. 4. Restart affected services/systems.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to Arcserve UDP management interfaces to trusted administrative networks only.
Use firewall rules to block external access to Arcserve UDP ports (typically 8014, 8015, 8019)
Service Account Hardening
windowsEnsure Arcserve UDP services run with minimal necessary privileges.
Review and adjust service account permissions to least privilege
🧯 If You Can't Patch
- Implement strict network access controls to limit who can reach the Arcserve UDP management interface
- Monitor for suspicious file uploads or execution attempts on Arcserve servers
🔍 How to Verify
Check if Vulnerable:
Check Arcserve UDP version via Control Panel > Programs and Features or using 'wmic product get name,version' command
Check Version:
wmic product where "name like 'Arcserve%UDP%'" get name,version
Verify Fix Applied:
Confirm version is 9.2 or higher and test that file upload functionality to RPSService4CPMImpl is properly restricted
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to Arcserve UDP service directories
- Suspicious process execution from Arcserve service accounts
- Authentication bypass attempts to RPSService4CPMImpl
Network Indicators:
- Unusual outbound connections from Arcserve servers
- External connections to Arcserve UDP management ports
SIEM Query:
source="arcserve.log" AND ("file upload" OR "RPSService4CPMImpl") AND result="success"