CVE-2025-34520

9.8 CRITICAL

📋 TL;DR

An authentication bypass vulnerability in Arcserve Unified Data Protection (UDP) allows unauthenticated attackers to bypass login mechanisms and gain administrator-level access without valid credentials. This affects all UDP versions prior to 10.2, putting protected functionality and user accounts at risk.

💻 Affected Systems

Products:
  • Arcserve Unified Data Protection (UDP)
Versions: All versions prior to 10.2
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Versions 8.0 through 10.1 are supported and require patching. Versions 7.x and earlier are unsupported and must be upgraded.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers gain administrative control, access sensitive backup data, modify configurations, and potentially deploy ransomware or other malware.

🟠

Likely Case

Unauthorized access to backup data, configuration changes that disrupt operations, and potential data exfiltration or encryption.

🟢

If Mitigated

Limited impact if system is isolated, but still vulnerable to internal threats or compromised accounts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows unauthenticated exploitation through request manipulation or logic flaws.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.2

Vendor Advisory: https://support.arcserve.com/s/article/Important-Security-Bulletin-Must-read-for-all-Arcserve-UDP-customers-on-all-versions

Restart Required: Yes

Instructions:

1. Download UDP 10.2 from Arcserve support portal. 2. Backup current configuration. 3. Apply patch or upgrade to version 10.2. 4. Restart UDP services. 5. Verify successful installation.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to UDP management interface to trusted IP addresses only

Use firewall rules to limit access to UDP ports (default 8014/TCP, 8015/TCP)

Access Control Lists

all

Implement strict network segmentation and access controls

Configure network ACLs to allow only administrative workstations to connect to UDP interface

🧯 If You Can't Patch

  • Immediately isolate the UDP server from internet and untrusted networks
  • Implement strict monitoring and alerting for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check UDP version in administration console or via command line: udp version

Check Version:

udp version

Verify Fix Applied:

Verify version shows 10.2 or later in administration console

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful access
  • Unauthorized IP addresses accessing administrative endpoints
  • Unusual administrative actions from non-standard accounts

Network Indicators:

  • Unusual traffic patterns to UDP management ports
  • Requests bypassing authentication endpoints
  • Administrative API calls from unauthenticated sources

SIEM Query:

source="udp.log" AND (event_type="authentication" AND result="success" AND source_ip NOT IN [admin_ips]) OR (endpoint="/admin/*" AND user="anonymous")

🔗 References

📤 Share & Export