CVE-2024-52945

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code by loading malicious DLLs when users run specific NetBackup commands on Windows systems. It affects Veritas NetBackup versions before 10.5 running on Windows operating systems. Attackers can exploit this through social engineering or by tricking users into executing vulnerable commands.

💻 Affected Systems

Products:
  • Veritas NetBackup
Versions: All versions before 10.5
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations. Linux/Unix systems are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the executing user, potentially leading to domain takeover if executed with administrative rights.

🟠

Likely Case

Local privilege escalation or lateral movement within the network when attackers trick users into running vulnerable commands.

🟢

If Mitigated

Limited impact if proper user training and execution controls prevent unauthorized command execution.

🌐 Internet-Facing: LOW - Requires user interaction and specific command execution, not directly internet-exposed.
🏢 Internal Only: HIGH - Significant risk in internal environments where users may execute NetBackup commands and attackers can use social engineering.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction and social engineering to execute specific commands. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.5 or later

Vendor Advisory: https://www.veritas.com/content/support/en_US/security/VTS24-012

Restart Required: Yes

Instructions:

1. Download NetBackup 10.5 or later from Veritas support portal. 2. Backup current configuration. 3. Install the update following Veritas documentation. 4. Restart affected systems. 5. Verify installation and functionality.

🔧 Temporary Workarounds

Restrict NetBackup Command Execution

windows

Limit which users can execute NetBackup commands through Windows Group Policy or application whitelisting.

Implement DLL Safe Search Order

windows

Configure Windows to search system directories first before current directory for DLL loading.

🧯 If You Can't Patch

  • Implement strict user training about executing untrusted commands and social engineering awareness.
  • Deploy application control solutions to restrict execution of NetBackup commands to authorized personnel only.

🔍 How to Verify

Check if Vulnerable:

Check NetBackup version via 'bpversion' command and verify if it's below 10.5 on Windows systems.

Check Version:

bpversion

Verify Fix Applied:

Run 'bpversion' command and confirm version is 10.5 or higher. Test NetBackup functionality to ensure patch didn't break operations.

📡 Detection & Monitoring

Log Indicators:

  • Unusual NetBackup command execution patterns
  • Failed DLL loading attempts from unusual locations
  • User account executing NetBackup commands unexpectedly

Network Indicators:

  • Unusual outbound connections from NetBackup servers following command execution

SIEM Query:

source="windows" AND (process_name="netbackup*" OR command_line="*bp*") AND (event_id=4688 OR event_id=1)

🔗 References

📤 Share & Export