Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
Reference:
Advisory #2023-76
Version:
1.0
Affected software:
Arcserve UDP Backup versions 7.0 to 9.0
Type:
Authentication bypass
CVE/CVSS:
CVE-2023-26258
Exploitation of CVE-2023-26258 allows an attacker to wipe the victim's backups, making it very likely for this exploit to be used in ransomware attacks. Although local access to the network is needed, a successful attack can have severe impact to the confidentiality, the integrity, and the availability of a company’s backup infrastructure.
An authentication bypass vulnerability in Arcserve UDP Backup software versions 7.0 up to 9.0, can allow an attacker with access to the local network to gain access to the administrator interface, after obtaining easy-to-decrypt admin credentials by capturing SOAP requests containing AuthUUIDs to get valid administrator sessions.
Researchers warn that even if the vulnerability is patched, administrator credentials can be retrieved if the database uses the default configuration and the default credentials. The vulnerability tracked as CVE-2023-26258 has no CVSS3.0 score yet but is estimated with a high severity.
A proof-of-concept (PoC) is available. No exploitation is observed in the wild yet.
The Centre for Cybersecurity Belgium strongly recommends system administrators to take the following actions: