CVE-2024-0799

9.8 CRITICAL

📋 TL;DR

This authentication bypass vulnerability in Arcserve Unified Data Protection allows attackers to gain unauthorized access without valid credentials by exploiting a flaw in the login function. It affects organizations using vulnerable versions of Arcserve UDP for data protection and backup operations.

💻 Affected Systems

Products:
  • Arcserve Unified Data Protection
Versions: 9.2 and 8.1
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web UI component specifically in the EdgeLoginServiceImpl.doLogin() function.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of backup infrastructure leading to data theft, ransomware deployment, or destruction of backup data, potentially crippling disaster recovery capabilities.

🟠

Likely Case

Unauthorized access to backup management console allowing configuration changes, data exfiltration, or deployment of malware within the backup environment.

🟢

If Mitigated

Limited impact if system is isolated, monitored, and access is restricted, though authentication bypass remains a critical finding.

🌐 Internet-Facing: HIGH - If exposed to internet, attackers can directly exploit without network access.
🏢 Internal Only: HIGH - Even internally, any user with network access could exploit to gain administrative privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-287 indicates improper authentication - typically straightforward to exploit once details are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Arcserve security advisory for specific patched versions

Vendor Advisory: https://www.arcserve.com/support-resources/security-advisories

Restart Required: Yes

Instructions:

1. Check current Arcserve UDP version. 2. Download and apply latest security patches from Arcserve support portal. 3. Restart Arcserve UDP services. 4. Verify patch installation.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to Arcserve UDP management interface

Use firewall rules to block external access to Arcserve UDP ports (typically 8014, 8015)

Access Control Lists

all

Implement strict source IP restrictions for management interface

Configure network ACLs to allow only trusted management IPs

🧯 If You Can't Patch

  • Isolate Arcserve UDP systems on separate VLAN with strict firewall rules
  • Implement multi-factor authentication at network perimeter and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check Arcserve UDP version against affected versions (9.2, 8.1) and review system logs for authentication anomalies

Check Version:

Check Arcserve UDP console or installation directory for version information

Verify Fix Applied:

Verify installed version is newer than affected versions and test authentication functionality

📡 Detection & Monitoring

Log Indicators:

  • Failed login attempts followed by successful access from same source
  • Authentication bypass patterns in web server logs
  • Unusual administrative actions from new IP addresses

Network Indicators:

  • HTTP requests to /wizardLogin endpoint with unusual parameters
  • Traffic to Arcserve UDP ports from unauthorized sources

SIEM Query:

source="arcserve_logs" AND (event_type="authentication" AND result="success" AND user_agent="*exploit*") OR (event_type="admin_action" AND src_ip NOT IN trusted_ips)

🔗 References

📤 Share & Export