CVE-2024-53913

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Veritas Enterprise Vault servers by sending malicious data to a .NET Remoting TCP port. The issue stems from deserialization of untrusted data, enabling remote code execution. Organizations running Enterprise Vault versions before 15.2 are affected.

💻 Affected Systems

Products:
  • Veritas Enterprise Vault
Versions: All versions before 15.2
Operating Systems: Windows (as Enterprise Vault is Windows-based)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Enterprise Vault server component when .NET Remoting TCP port is accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install malware, steal sensitive data, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Remote code execution leading to data theft, ransomware deployment, or system disruption.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation.

🌐 Internet-Facing: HIGH - Directly exploitable over network without authentication.
🏢 Internal Only: HIGH - Exploitable from any network segment with access to the vulnerable port.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

ZDI-CAN-24343 indicates coordinated vulnerability disclosure; exploit likely exists in threat actor toolkits.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 15.2 or later

Vendor Advisory: https://www.veritas.com/content/support/en_US/security/VTS24-014

Restart Required: Yes

Instructions:

1. Download Enterprise Vault 15.2 or later from Veritas support portal. 2. Backup configuration and data. 3. Run installer with administrative privileges. 4. Restart Enterprise Vault services.

🔧 Temporary Workarounds

Network Segmentation

windows

Restrict access to Enterprise Vault .NET Remoting TCP port using firewall rules.

Windows Firewall: New-NetFirewallRule -DisplayName 'Block EV Remoting' -Direction Inbound -LocalPort [PORT_NUMBER] -Protocol TCP -Action Block

Disable .NET Remoting

windows

Configure Enterprise Vault to disable .NET Remoting if not required.

Modify Enterprise Vault configuration files to remove or disable remoting endpoints

🧯 If You Can't Patch

  • Implement strict network access controls to limit which systems can reach the vulnerable port
  • Monitor for unusual network connections to the .NET Remoting port and suspicious process creation

🔍 How to Verify

Check if Vulnerable:

Check Enterprise Vault version in Administration Console or registry: HKEY_LOCAL_MACHINE\SOFTWARE\Veritas\Enterprise Vault\CurrentVersion

Check Version:

reg query "HKLM\SOFTWARE\Veritas\Enterprise Vault\CurrentVersion" /v Version

Verify Fix Applied:

Verify version is 15.2 or higher and test .NET Remoting functionality if required.

📡 Detection & Monitoring

Log Indicators:

  • Unusual .NET Remoting connections in Windows Event Logs
  • Unexpected process creation from Enterprise Vault services

Network Indicators:

  • Unusual traffic to Enterprise Vault .NET Remoting port (default 808)
  • Suspicious serialized .NET objects in network traffic

SIEM Query:

source="windows" AND (event_id=4688 OR event_id=5156) AND process_name="EnterpriseVault*" AND dest_port=808

🔗 References

📤 Share & Export