Commvault Reported Critical Webserver Vulnerability

Commvault has recently patched a critical vulnerability in its software affecting versions 11.20 to 11.36. This flaw, present in both Linux and Windows platforms, could enable attackers to deploy webshells on web servers, potentially granting unauthorized system access. If exploited, the vulnerability could result in data breaches and other malicious activities. To mitigate the risk, Commvault has released security updates and strongly advises users to apply the patches immediately to safeguard their infrastructure.

Technical Description

Commvault, a leading provider of data protection and management solutions, has recently fixed a critical webserver vulnerability that could have enabled attackers to compromise systems using its software. The flaw impacts multiple versions of Commvault software on both Linux and Windows platforms.

The vulnerability allows attackers to deploy webshells on affected servers, enabling remote command execution. Webshells are malicious scripts that grant attackers control over compromised web servers, allowing them to manipulate sensitive data, steal information, or launch further attacks within the network. This flaw, present in Commvault versions 11.20 to 11.36, has been addressed in the latest releases. Due to the potential for data breaches and unauthorized system control, the severity of this issue is significant.

Webshell and Exploitation
A webshell is a malicious script uploaded to a web server, often through insecure web applications, allowing attackers to execute commands remotely without direct access. In the case of the Commvault vulnerability, attackers exploit weaknesses in the webserver module to execute webshells. These flaws enable the injection of malicious code or commands via the web interface, granting full system access. Once compromised, attackers can move laterally through the server and network, exfiltrating data or targeting additional systems.

Conclusion

This vulnerability in Commvault’s software highlights the critical need for keeping security measures up to date across all platforms. While webshells are a well-known threat, they remain highly effective if not promptly mitigated. To remediate the vulnerability, Commvault recommends installing the resolved maintenance release for the affected version on the CommServe and Web Servers.

Impact

The vulnerability in Commvault’s software presents a significant risk, potentially leading to severe data breaches, unauthorized access and the manipulation or loss of critical business data. Exploiting this flaw, attackers could compromise entire systems, escalate privileges and disrupt business operations. If not patched, this vulnerability threatens the confidentiality and integrity of organizational data.

Commvault Versions
Product Platforms Affected Versions Resolved Version
Commvault Linux, Windows 11.36.0 - 11.36.44 11.36.45
Commvault Linux, Windows 11.32.0 - 11.32.86 11.32.87
Commvault Linux, Windows 11.28.0 - 11.28.139 11.28.140
Commvault Linux, Windows 11.20.0 - 11.20.215 11.20.216

IOC and Context Details

Table
Topics Details
Tactic Name NA
Technique Name NA
Sub Technique Name NA
Attack Type Vulnerability
Targeted Applications Commvault
Region Impacted Global
Industry Impacted All
IOC’s NA
CVE NA

Recommended Actions

  1. Immediately apply the resolved maintenance release for affected versions on CommServe and Web Servers.
  2. Upgrade to the latest software version to ensure protection against this vulnerability.
  3. Follow the “Installing Commvault Software Updates on Demand” documentation for detailed patching instructions.
  4. Monitor systems for any suspicious activity post-patching to detect and eliminate potential backdoors.

References