CVE-2025-57789

5.4 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to gain administrative control of affected systems by exploiting default credentials during the brief setup window between installation and first administrator login. Only systems in the initial configuration phase before any jobs are configured are vulnerable. Organizations deploying new instances of affected software are at risk.

💻 Affected Systems

Products:
  • Commvault software
Versions: Specific versions not provided in CVE description; check vendor advisory
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable during initial setup phase before first administrator login and job configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete administrative compromise of the system, allowing attackers to configure malicious jobs, exfiltrate data, or establish persistence.

🟠

Likely Case

Temporary administrative access during setup phase, potentially allowing configuration of unauthorized jobs or initial foothold.

🟢

If Mitigated

No impact if systems are properly configured before exposure or if default credentials are changed immediately.

🌐 Internet-Facing: HIGH - Remote attackers can exploit this without authentication during the vulnerable window.
🏢 Internal Only: MEDIUM - Internal attackers could exploit during setup, but requires network access to the system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires timing to catch systems during the brief setup window.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific fixed versions

Vendor Advisory: https://documentation.commvault.com/securityadvisories/CV_2025_08_4.html

Restart Required: No

Instructions:

1. Update to the latest patched version from Commvault. 2. Ensure all new installations complete initial configuration immediately. 3. Change default credentials before exposing systems to networks.

🔧 Temporary Workarounds

Immediate credential change

all

Change default administrator credentials immediately after installation before exposing to any network

Isolated setup environment

all

Perform initial installation and configuration in an isolated network environment

🧯 If You Can't Patch

  • Ensure all installations complete initial configuration and credential change before network exposure
  • Implement network segmentation to restrict access to systems during setup phase

🔍 How to Verify

Check if Vulnerable:

Check if system is in initial setup phase (no jobs configured) and default credentials are still active

Check Version:

Check Commvault documentation for version verification commands specific to your deployment

Verify Fix Applied:

Verify system has completed initial configuration, jobs are configured, and default credentials have been changed

📡 Detection & Monitoring

Log Indicators:

  • Authentication attempts using default credentials
  • Administrative actions during initial setup window

Network Indicators:

  • Unexpected administrative access from unauthorized sources during setup phase

SIEM Query:

Authentication events with default credentials OR administrative actions from new installations before job configuration

🔗 References

📤 Share & Export