CVE-2024-52945
📋 TL;DR
This vulnerability allows attackers to execute arbitrary code by loading malicious DLLs when users run specific NetBackup commands on Windows systems. It affects Veritas NetBackup versions before 10.5 running on Windows operating systems. Attackers can exploit this through social engineering or by tricking users into executing vulnerable commands.
💻 Affected Systems
- Veritas NetBackup
📦 What is this software?
Netbackup by Veritas
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with attacker gaining the same privileges as the executing user, potentially leading to domain takeover if executed with administrative rights.
Likely Case
Local privilege escalation or lateral movement within the network when attackers trick users into running vulnerable commands.
If Mitigated
Limited impact if proper user training and execution controls prevent unauthorized command execution.
🎯 Exploit Status
Requires user interaction and social engineering to execute specific commands. No public exploit code available at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 10.5 or later
Vendor Advisory: https://www.veritas.com/content/support/en_US/security/VTS24-012
Restart Required: Yes
Instructions:
1. Download NetBackup 10.5 or later from Veritas support portal. 2. Backup current configuration. 3. Install the update following Veritas documentation. 4. Restart affected systems. 5. Verify installation and functionality.
🔧 Temporary Workarounds
Restrict NetBackup Command Execution
windowsLimit which users can execute NetBackup commands through Windows Group Policy or application whitelisting.
Implement DLL Safe Search Order
windowsConfigure Windows to search system directories first before current directory for DLL loading.
🧯 If You Can't Patch
- Implement strict user training about executing untrusted commands and social engineering awareness.
- Deploy application control solutions to restrict execution of NetBackup commands to authorized personnel only.
🔍 How to Verify
Check if Vulnerable:
Check NetBackup version via 'bpversion' command and verify if it's below 10.5 on Windows systems.
Check Version:
bpversion
Verify Fix Applied:
Run 'bpversion' command and confirm version is 10.5 or higher. Test NetBackup functionality to ensure patch didn't break operations.
📡 Detection & Monitoring
Log Indicators:
- Unusual NetBackup command execution patterns
- Failed DLL loading attempts from unusual locations
- User account executing NetBackup commands unexpectedly
Network Indicators:
- Unusual outbound connections from NetBackup servers following command execution
SIEM Query:
source="windows" AND (process_name="netbackup*" OR command_line="*bp*") AND (event_id=4688 OR event_id=1)