HomeVulnerabilityPre-Auth Exploit Chains Present in Commvault May Allow Distant Code Execution Attacks

Pre-Auth Exploit Chains Present in Commvault May Allow Distant Code Execution Attacks

Commvault has launched updates to handle 4 security gaps that may very well be exploited to realize distant code execution on prone situations.

The record of vulnerabilities, recognized in Commvault variations earlier than 11.36.60, is as follows –

  • CVE-2025-57788 (CVSS rating: 6.9) – A vulnerability in a identified login mechanism permits unauthenticated attackers to execute API calls with out requiring person credentials
  • CVE-2025-57789 (CVSS rating: 5.3) – A vulnerability in the course of the setup part between set up and the primary administrator login that enables distant attackers to take advantage of the default credentials to realize admin management
  • CVE-2025-57790 (CVSS rating: 8.7) – A path traversal vulnerability that enables distant attackers to carry out unauthorized file system entry by a path traversal concern, leading to distant code execution
  • CVE-2025-57791 (CVSS rating: 6.9) – A vulnerability that enables distant attackers to inject or manipulate command-line arguments handed to inside elements because of inadequate enter validation, leading to a legitimate person session for a low-privilege position
Cybersecurity

watchTowr Labs researchers Sonny Macdonald and Piotr Bazydlo have been credited with discovering and reporting the 4 security defects in April 2025. All of the flagged vulnerabilities have been resolved in variations 11.32.102 and 11.36.60. Commvault SaaS resolution is just not affected.

See also  Over 250 Magento Shops Hit In a single day as Hackers Exploit New Adobe Commerce Flaw

In an evaluation revealed Wednesday, the cybersecurity firm stated menace actors might style these vulnerabilities into two pre-authenticated exploit chains to realize code execution on prone situations: One that mixes CVE-2025-57791 and CVE-2025-57790, and the opposite that strings CVE-2025-57788, CVE-2025-57789, and CVE-2025-57790.

It is value noting that the second pre-auth distant code execution chain turns into profitable provided that the built-in admin password hasn’t been modified since set up.

The disclosure comes practically 4 months after watchTowr Labs reported a important Commvault Command Middle flaw (CVE-2025-34028, CVSS rating: 10.0) that might permit arbitrary code execution on affected installations.

A month later, the U.S. Cybersecurity and Infrastructure Safety Company (CISA) added the vulnerability to its Identified Exploited Vulnerabilities (KEV) catalog, citing proof of lively exploitation within the wild.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular