CVE-2023-41998

9.8 CRITICAL

📋 TL;DR

Arcserve UDP versions before 9.2 contain an unauthenticated remote code execution vulnerability in the RPSService4CPMImpl interface. Attackers can upload and execute arbitrary files on affected systems, potentially gaining full control. Organizations using Arcserve UDP for backup and recovery are affected.

💻 Affected Systems

Products:
  • Arcserve Unified Data Protection
Versions: All versions prior to 9.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the default installation of Arcserve UDP backup management components.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code, steal sensitive backup data, deploy ransomware, or pivot to other network systems.

🟠

Likely Case

Attackers gain initial access to backup servers, potentially compromising backup integrity and using the system as a foothold for lateral movement.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the backup system itself without lateral movement capabilities.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication, making internet-exposed systems immediate targets.
🏢 Internal Only: HIGH - Even internally, the vulnerability allows unauthenticated attackers to compromise backup infrastructure.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Tenable published technical details and proof-of-concept, making exploitation straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.2 or later

Vendor Advisory: https://support.arcserve.com/s/article/000019995

Restart Required: Yes

Instructions:

1. Download Arcserve UDP 9.2 or later from official vendor portal. 2. Backup current configuration. 3. Install the update following vendor documentation. 4. Restart affected services/systems.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Arcserve UDP management interfaces to trusted administrative networks only.

Use firewall rules to block external access to Arcserve UDP ports (typically 8014, 8015, 8019)

Service Account Hardening

windows

Ensure Arcserve UDP services run with minimal necessary privileges.

Review and adjust service account permissions to least privilege

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the Arcserve UDP management interface
  • Monitor for suspicious file uploads or execution attempts on Arcserve servers

🔍 How to Verify

Check if Vulnerable:

Check Arcserve UDP version via Control Panel > Programs and Features or using 'wmic product get name,version' command

Check Version:

wmic product where "name like 'Arcserve%UDP%'" get name,version

Verify Fix Applied:

Confirm version is 9.2 or higher and test that file upload functionality to RPSService4CPMImpl is properly restricted

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to Arcserve UDP service directories
  • Suspicious process execution from Arcserve service accounts
  • Authentication bypass attempts to RPSService4CPMImpl

Network Indicators:

  • Unusual outbound connections from Arcserve servers
  • External connections to Arcserve UDP management ports

SIEM Query:

source="arcserve.log" AND ("file upload" OR "RPSService4CPMImpl") AND result="success"

🔗 References

📤 Share & Export