CVE-2025-3928

8.8 HIGH CISA KEV

📋 TL;DR

CVE-2025-3928 is a vulnerability in Commvault Web Server that allows authenticated remote attackers to create and execute webshells, potentially leading to complete system compromise. This affects all Commvault Web Server installations running vulnerable versions. The vulnerability is actively exploited and listed in CISA's Known Exploited Vulnerabilities catalog.

💻 Affected Systems

Products:
  • Commvault Web Server
Versions: All versions before 11.36.46, 11.32.89, 11.28.141, and 11.20.217
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both Windows and Linux platforms. Requires authenticated access but default configurations may be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Commvault server, data exfiltration, ransomware deployment, and lateral movement to connected systems.

🟠

Likely Case

Unauthorized access to backup data, deployment of persistent backdoors, and potential credential theft from the Commvault environment.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication controls, and monitoring preventing successful exploitation.

🌐 Internet-Facing: HIGH - Remote authenticated exploitation makes internet-facing instances prime targets for attackers.
🏢 Internal Only: HIGH - Even internally accessible servers are at significant risk from compromised credentials or insider threats.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Actively exploited in the wild per CISA KEV catalog. Requires authenticated access but exploitation appears straightforward based on advisory description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.36.46, 11.32.89, 11.28.141, or 11.20.217 depending on your version track

Vendor Advisory: https://documentation.commvault.com/securityadvisories/CV_2025_03_1.html

Restart Required: Yes

Instructions:

1. Identify current Commvault version. 2. Download appropriate patch from Commvault support portal. 3. Apply patch following Commvault upgrade procedures. 4. Restart Commvault services. 5. Verify successful update.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to Commvault Web Server to only trusted administrative networks

Enhanced Authentication Controls

all

Implement multi-factor authentication and strong password policies for Commvault administrative accounts

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the Commvault Web Server
  • Enable detailed logging and monitoring for webshell creation and execution attempts

🔍 How to Verify

Check if Vulnerable:

Check Commvault version via CommCell Console or command line. Vulnerable if version is below the patched versions listed.

Check Version:

On Commvault server: qoperation execscript -sn GetVersionInfo (Windows/Linux)

Verify Fix Applied:

Verify version shows 11.36.46, 11.32.89, 11.28.141, or 11.20.217 or higher in CommCell Console.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file creation in web directories
  • Suspicious process execution from web server context
  • Unexpected authentication patterns

Network Indicators:

  • Unusual outbound connections from Commvault server
  • Webshell communication patterns
  • Anomalous HTTP requests to Commvault web interface

SIEM Query:

source="commvault" AND (event="file_create" OR event="process_execute") AND (path="*.jsp" OR path="*.php" OR path="*.asp" OR path="*.aspx")

🔗 References

📤 Share & Export