{"document":{"acknowledgments":[{"urls":["https://kb.cert.org/vuls/id/429301#acknowledgements"]}],"category":"CERT/CC Vulnerability Note","csaf_version":"2.0","notes":[{"category":"summary","text":"### Overview\r\n\r\nVeritas Backup Exec contains a privilege escalation vulnerability due to the use of an `OPENSSLDIR` variable that specifies a location where an unprivileged Windows user can create files.\r\n\r\n### Description\r\n\r\n**CVE-2019-1552**\r\n\r\nVeritas Backup Exec includes an OpenSSL component that specifies an `OPENSSLDIR` variable as  `/usr/local/ssl/`. On the Windows platform, this path is interpreted as `C:\\usr\\local\\ssl`. Backup Exec contains a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted `openssl.cnf` file to achieve arbitrary code execution with SYSTEM privileges.\r\n\r\n### Impact\r\nBy placing a specially-crafted `openssl.cnf` in the `C:\\usr\\local\\ssl` directory, an unprivileged user may be able to execute arbitrary code with SYSTEM privileges on a Windows system with the vulnerable Veritas software installed.\r\n\r\n### Solution\r\n\r\n#### Apply an update\r\nThis vulnerability is [addressed](https://www.veritas.com/content/support/en_US/security/VTS20-010) in Backup Exec 21.1 [Hotfix 657517](https://www.veritas.com/content/support/en_US/downloads/update.UPD657517) (Engineering version 21.0.1200.1217) and Backup Exec 20.6 [Hotfix 298543](https://www.veritas.com/content/support/en_US/downloads/update.UPD298543) (Engineering version 20.0.1188.2734).\r\n\r\n#### Create a C:\\usr\\local\\ssl directory\r\nIn cases where an update cannot be installed, this vulnerability can be mitigated by creating a `C:\\usr\\local\\ssl` directory and restricting ACLs to prevent unprivileged users from being able to write to this location.\r\n\r\n### Acknowledgements\r\nThis vulnerability was reported by Will Dormann of the CERT/CC.\r\n\r\nThis document was written by Will Dormann.","title":"Summary"},{"category":"legal_disclaimer","text":"THIS DOCUMENT IS PROVIDED ON AN 'AS IS' BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. ","title":"Legal Disclaimer"},{"category":"other","text":"CERT/CC Vulnerability Note is a limited advisory. It primarily identifies vendors impacted by the advisory and not specific products. We only support \"known_affected\" and \"known_not_affected\" status. Please consult the vendor's statements and advisory URL if provided by the vendor for more details ","title":"Limitations of Advisory"}],"publisher":{"category":"coordinator","contact_details":"Email: cert@cert.org, Phone: +1412 268 5800","issuing_authority":"CERT/CC under DHS/CISA https://www.cisa.gov/cybersecurity also see https://kb.cert.org/ ","name":"CERT/CC","namespace":"https://kb.cert.org/"},"references":[{"url":"https://certcc.github.io/certcc_disclosure_policy","summary":"CERT/CC vulnerability disclosure policy"},{"summary":"CERT/CC document released","category":"self","url":"https://kb.cert.org/vuls/id/429301"},{"url":"https://www.veritas.com/content/support/en_US/security/VTS20-010","summary":"https://www.veritas.com/content/support/en_US/security/VTS20-010"},{"url":"https://www.veritas.com/content/support/en_US/downloads/update.UPD657517","summary":"https://www.veritas.com/content/support/en_US/downloads/update.UPD657517"},{"url":"https://www.veritas.com/content/support/en_US/downloads/update.UPD298543","summary":"https://www.veritas.com/content/support/en_US/downloads/update.UPD298543"},{"url":"https://www.veritas.com/content/support/en_US/security/VTS20-010","summary":"Reference(s) from vendor \"Veritas Technologies\""},{"url":"https://www.veritas.com/content/support/en_US/downloads/update.UPD657517","summary":"Reference(s) from vendor \"Veritas Technologies\""},{"url":"https://www.veritas.com/content/support/en_US/downloads/update.UPD298543","summary":"Reference(s) from vendor \"Veritas Technologies\""}],"title":"Veritas Backup Exec is vulnerable to privilege escalation due to OPENSSLDIR location","tracking":{"current_release_date":"2021-01-06T18:37:26+00:00","generator":{"engine":{"name":"VINCE","version":"3.0.35"}},"id":"VU#429301","initial_release_date":"2020-12-23 20:15:31.248229+00:00","revision_history":[{"date":"2021-01-06T18:37:26+00:00","number":"1.20210106183726.3","summary":"Released on 2021-01-06T18:37:26+00:00"}],"status":"final","version":"1.20210106183726.3"}},"vulnerabilities":[{"title":"Veritas Backup Exec is vulnerable to privilege escalation via openssl.","notes":[{"category":"summary","text":"Veritas Backup Exec is vulnerable to privilege escalation via openssl.cnf"}],"cve":"CVE-2020-36167","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#429301"}],"product_status":{"known_affected":["CSAFPID-9ce5cad2-39db-11f1-8422-122e2785dc9f"]}}],"product_tree":{"branches":[{"category":"vendor","name":"Veritas Technologies","product":{"name":"Veritas Technologies Products","product_id":"CSAFPID-9ce5cad2-39db-11f1-8422-122e2785dc9f"}}]}}