Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0800: CWE-434 Unrestricted Upload of File with Dangerous Type in Arcserve Unified Data Protection

0
High
VulnerabilityCVE-2024-0800cvecve-2024-0800cwe-434
Published: Wed Mar 13 2024 (03/13/2024, 19:03:04 UTC)
Source: CVE Database V5
Vendor/Project: Arcserve
Product: Unified Data Protection

Description

A path traversal vulnerability exists in Arcserve Unified Data Protection 9.2 and 8.1 in edge-app-base-webui.jar!com.ca.arcserve.edge.app.base.ui.server.servlet.ImportNodeServlet.

AI-Powered Analysis

AILast updated: 12/23/2025, 17:11:24 UTC

Technical Analysis

CVE-2024-0800 is a path traversal vulnerability identified in Arcserve Unified Data Protection (UDP) versions 9.2 and 8.1, specifically within the ImportNodeServlet component of the edge-app-base-webui.jar. The vulnerability arises due to insufficient validation of file upload paths, allowing an attacker to upload files with dangerous types and traverse directories outside the intended upload folder. This is categorized under CWE-434, which concerns unrestricted upload of files with dangerous types. The vulnerability can be exploited remotely over the network with low privileges (PR:L) and does not require user interaction (UI:N). The CVSS v3.1 score is 8.8, indicating a high severity with impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). An attacker could leverage this flaw to write arbitrary files, potentially leading to remote code execution, privilege escalation, or disruption of backup and recovery operations. Although no known exploits are currently reported in the wild, the nature of the vulnerability and the critical role of Arcserve UDP in data protection make it a significant risk. The lack of available patches at the time of reporting necessitates immediate risk mitigation through access controls and monitoring. The vulnerability affects core backup infrastructure, which is often a high-value target for ransomware and advanced persistent threat actors.

Potential Impact

For European organizations, the impact of CVE-2024-0800 is substantial due to the critical role Arcserve Unified Data Protection plays in backup and disaster recovery. Exploitation could lead to unauthorized file uploads that compromise backup integrity, enabling attackers to implant malicious payloads or disrupt backup operations. This could result in data loss, prolonged downtime, and potential ransomware deployment, severely affecting business continuity. Confidential data could be exposed or altered, undermining compliance with GDPR and other data protection regulations. The availability of backup services could be compromised, delaying recovery efforts after an incident. Organizations in sectors such as finance, healthcare, manufacturing, and critical infrastructure are particularly vulnerable due to their reliance on reliable backup solutions and the sensitivity of their data. The high CVSS score reflects the broad and severe impact on confidentiality, integrity, and availability, emphasizing the need for rapid remediation.

Mitigation Recommendations

1. Apply official patches from Arcserve immediately once they become available to address the vulnerability directly. 2. Until patches are released, restrict network access to the Arcserve UDP management interface using firewalls and VPNs to limit exposure to trusted administrators only. 3. Implement strict file upload validation controls, including whitelisting allowed file types and enforcing path normalization to prevent traversal. 4. Monitor logs and network traffic for unusual file upload activities or attempts to access unauthorized directories. 5. Employ application-layer firewalls or web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the ImportNodeServlet. 6. Conduct regular security audits and penetration testing focused on backup infrastructure to identify and remediate similar weaknesses. 7. Educate system administrators on the risks of unrestricted file uploads and the importance of applying security updates promptly. 8. Maintain offline or immutable backups to ensure recovery capability in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
tenable
Date Reserved
2024-01-22T22:35:58.455Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69418d769050fe8508ffb31c

Added to database: 12/16/2025, 4:48:54 PM

Last enriched: 12/23/2025, 5:11:24 PM

Last updated: 2/3/2026, 4:45:59 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats