CVE-2025-27816

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote code execution on Arctera InfoScale servers through insecure deserialization of .NET remoting messages. Attackers can exploit this to gain full control of affected systems. Only servers with Disaster Recovery configured using the DR wizard are vulnerable.

💻 Affected Systems

Products:
  • Arctera InfoScale
Versions: 7.0 through 8.0.2
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when Disaster Recovery is configured using the DR wizard, which enables the Plugin_Host service.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to data theft, ransomware deployment, or lateral movement across the network.

🟠

Likely Case

Remote code execution with SYSTEM/administrator privileges, allowing attackers to install malware, exfiltrate data, or disrupt operations.

🟢

If Mitigated

Limited impact if service is disabled or network access is restricted, though the vulnerability remains present.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Insecure deserialization vulnerabilities are frequently exploited with publicly available tools and techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.0.3 or later

Vendor Advisory: https://www.veritas.com/content/support/en_US/security/ARC25-002

Restart Required: Yes

Instructions:

1. Download and install InfoScale version 8.0.3 or later from Veritas support portal. 2. Restart affected systems. 3. Verify the Plugin_Host service is no longer vulnerable.

🔧 Temporary Workarounds

Disable Plugin_Host Service

windows

Manually disable the vulnerable Windows service to eliminate the attack vector.

sc stop Plugin_Host
sc config Plugin_Host start= disabled

🧯 If You Can't Patch

  • Disable the Plugin_Host service on all affected systems immediately.
  • Implement network segmentation to restrict access to the .NET remoting endpoint (default port 9000).

🔍 How to Verify

Check if Vulnerable:

Check if InfoScale version is between 7.0 and 8.0.2 and Plugin_Host service is running.

Check Version:

Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*InfoScale*'} | Select-Object Name, Version

Verify Fix Applied:

Verify InfoScale version is 8.0.3+ and Plugin_Host service is either patched or disabled.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Plugin_Host service
  • Failed authentication attempts to .NET remoting endpoint
  • Abnormal network connections to port 9000

Network Indicators:

  • Unexpected traffic to TCP port 9000
  • .NET remoting protocol anomalies
  • Suspicious serialized object payloads

SIEM Query:

source="windows" AND service="Plugin_Host" AND (event_id=4688 OR process_name="cmd.exe" OR process_name="powershell.exe")

🔗 References

📤 Share & Export