CVE-2022-45461: n/a in n/a
The Java Admin Console in Veritas NetBackup through 10.1 and related Veritas products on Linux and UNIX allows authenticated non-root users (that have been explicitly added to the auth.conf file) to execute arbitrary commands as root.
AI Analysis
Technical Summary
CVE-2022-45461 is a high-severity vulnerability affecting the Java Admin Console component of Veritas NetBackup versions up to 10.1, as well as related Veritas products running on Linux and UNIX platforms. The vulnerability allows authenticated non-root users, who have been explicitly granted access via the auth.conf configuration file, to execute arbitrary commands with root privileges. This escalation of privilege stems from improper handling of command execution within the Java Admin Console, classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). The vulnerability requires that the attacker already has low-privileged authenticated access to the system, but does not require any user interaction beyond that. The CVSS v3.1 base score is 7.5, reflecting high impact on confidentiality, integrity, and availability, with attack complexity rated as high due to the prerequisite of authenticated access and specific configuration. No public exploits are currently known in the wild, and no official patches or mitigation links were provided at the time of publication. The vulnerability's scope is limited to systems running the affected Veritas NetBackup Java Admin Console on Linux/UNIX, but given the critical role of NetBackup in enterprise backup and recovery infrastructure, exploitation could lead to full system compromise and control over backup data and processes.
Potential Impact
For European organizations, the impact of CVE-2022-45461 could be significant, particularly for enterprises relying on Veritas NetBackup for critical data backup and disaster recovery operations. Successful exploitation would allow an attacker with low-level authenticated access to escalate privileges to root, potentially leading to unauthorized access to sensitive backup data, manipulation or deletion of backups, and disruption of backup services. This could result in data loss, extended downtime, and compromise of data integrity, severely affecting business continuity and compliance with data protection regulations such as GDPR. Additionally, attackers could leverage root access to pivot within the network, increasing the risk of broader compromise. Organizations in sectors with stringent data protection requirements—such as finance, healthcare, and government—are especially vulnerable to the consequences of such an exploit.
Mitigation Recommendations
1. Restrict and audit access to the auth.conf file to ensure only trusted users are granted authenticated access to the Java Admin Console. 2. Implement strict access controls and network segmentation to limit which users and systems can reach the NetBackup Java Admin Console interface. 3. Monitor and log all administrative access and command executions within the NetBackup environment to detect anomalous activities indicative of exploitation attempts. 4. Apply the latest Veritas NetBackup updates and patches as soon as they become available, even if not explicitly linked, by regularly checking Veritas security advisories. 5. Consider disabling or restricting the Java Admin Console if it is not essential for operations, or replace it with alternative management interfaces with stronger security controls. 6. Conduct regular security assessments and penetration tests focusing on backup infrastructure to identify and remediate privilege escalation paths. 7. Employ multi-factor authentication (MFA) for all administrative access to reduce the risk of credential compromise leading to exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Switzerland
CVE-2022-45461: n/a in n/a
Description
The Java Admin Console in Veritas NetBackup through 10.1 and related Veritas products on Linux and UNIX allows authenticated non-root users (that have been explicitly added to the auth.conf file) to execute arbitrary commands as root.
AI-Powered Analysis
Technical Analysis
CVE-2022-45461 is a high-severity vulnerability affecting the Java Admin Console component of Veritas NetBackup versions up to 10.1, as well as related Veritas products running on Linux and UNIX platforms. The vulnerability allows authenticated non-root users, who have been explicitly granted access via the auth.conf configuration file, to execute arbitrary commands with root privileges. This escalation of privilege stems from improper handling of command execution within the Java Admin Console, classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). The vulnerability requires that the attacker already has low-privileged authenticated access to the system, but does not require any user interaction beyond that. The CVSS v3.1 base score is 7.5, reflecting high impact on confidentiality, integrity, and availability, with attack complexity rated as high due to the prerequisite of authenticated access and specific configuration. No public exploits are currently known in the wild, and no official patches or mitigation links were provided at the time of publication. The vulnerability's scope is limited to systems running the affected Veritas NetBackup Java Admin Console on Linux/UNIX, but given the critical role of NetBackup in enterprise backup and recovery infrastructure, exploitation could lead to full system compromise and control over backup data and processes.
Potential Impact
For European organizations, the impact of CVE-2022-45461 could be significant, particularly for enterprises relying on Veritas NetBackup for critical data backup and disaster recovery operations. Successful exploitation would allow an attacker with low-level authenticated access to escalate privileges to root, potentially leading to unauthorized access to sensitive backup data, manipulation or deletion of backups, and disruption of backup services. This could result in data loss, extended downtime, and compromise of data integrity, severely affecting business continuity and compliance with data protection regulations such as GDPR. Additionally, attackers could leverage root access to pivot within the network, increasing the risk of broader compromise. Organizations in sectors with stringent data protection requirements—such as finance, healthcare, and government—are especially vulnerable to the consequences of such an exploit.
Mitigation Recommendations
1. Restrict and audit access to the auth.conf file to ensure only trusted users are granted authenticated access to the Java Admin Console. 2. Implement strict access controls and network segmentation to limit which users and systems can reach the NetBackup Java Admin Console interface. 3. Monitor and log all administrative access and command executions within the NetBackup environment to detect anomalous activities indicative of exploitation attempts. 4. Apply the latest Veritas NetBackup updates and patches as soon as they become available, even if not explicitly linked, by regularly checking Veritas security advisories. 5. Consider disabling or restricting the Java Admin Console if it is not essential for operations, or replace it with alternative management interfaces with stronger security controls. 6. Conduct regular security assessments and penetration tests focusing on backup infrastructure to identify and remediate privilege escalation paths. 7. Employ multi-factor authentication (MFA) for all administrative access to reduce the risk of credential compromise leading to exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-11-17T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983dc4522896dcbeefa6
Added to database: 5/21/2025, 9:09:17 AM
Last enriched: 6/24/2025, 11:35:06 PM
Last updated: 8/3/2025, 2:07:39 PM
Views: 13
Related Threats
CVE-2025-53534: CWE-305: Authentication Bypass by Primary Weakness in tnb-labs panel
HighCVE-2025-52237: n/a
HighCVE-2025-51541: n/a
HighCVE-2025-50592: n/a
MediumCVE-2025-43979: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.