Companies functioning Arcserve Unified Data Protection to handle their archives and backups are being instructed to update their software after flaw hunters identified four distantly effort security bugs.

Analysts with Digital Defense discovered the running month four flaws that, if employed through a phishing threat or harmful webpage, would permit a hacker to elevate credentials or approach data funded in the recovery system and UDP data archiving through its web services elements.

The Digital Defense unit stated that the vulnerability bundle contains of two diverse information revelation bugs (one in /gateway/services/EdgeServiceImpl and also another through  UDPUpdates / Config / FullUpdateSettings.xml, a cross site playscript flaw (in authentication endpoint / domain.jsp), and an XML External Entity bug that could permit data revelation through management / dpHttpService.

“The vulnerabilities can open the door for potential compromise of sensitive data through access to credentials, phishing attacks and the ability for a hacker to read files without authentication from the hosting system,” Digital Defense explained.

The flaws are merely existing in the Web Services elements of the UDP Gateway and UDP Console; the two instrumentsused by admins to manage and access backup archives. Machines functioning the UDP Agent software and UDP Recovery Point Server are not impacted.

Digital Defense stated it privately revealed the bug luckily for Arcserve users, and Arcserve has earlier put out a fix. Those functioning UDP 6.5 Update 3 and Update 4 can download the patches directly from Arcserve, while organizations employing UDP on a standalone gateway will yet  require to manually install the fix on those boxes.

Leave a Reply

Your email address will not be published. Required fields are marked *