CVE-2024-33672: n/a
CVE-2024-33672 is a high-severity vulnerability affecting Veritas NetBackup versions prior to 10. 4. The issue resides in the Multi-Threaded Agent component, which can be exploited by an unauthenticated attacker with local access to delete arbitrary protected files. The vulnerability does not impact confidentiality but can severely affect integrity and availability by enabling deletion of critical backup files. Exploitation requires local access but no user interaction or privileges, making it relatively easy to exploit in compromised environments. No known public exploits have been reported yet. Organizations relying on NetBackup for data protection should prioritize patching once updates become available and implement strict access controls to limit local access to the Multi-Threaded Agent. Countries with significant deployments of Veritas NetBackup, especially those with large enterprise and government sectors, are at higher risk. The vulnerability is classified as high severity with a CVSS score of 7. 7 due to its potential to disrupt backup integrity and availability.
AI Analysis
Technical Summary
CVE-2024-33672 is a vulnerability discovered in Veritas NetBackup versions before 10.4, specifically in the Multi-Threaded Agent component. This agent can be manipulated to perform arbitrary file deletions on files that are otherwise protected by the backup system. The vulnerability is categorized under CWE-427, which relates to uncontrolled search path elements or improper file deletion. The CVSS 3.1 base score is 7.7, indicating high severity, with the vector indicating low attack complexity (AC:L), local attack vector (AV:L), no privileges required (PR:N), no user interaction (UI:N), and impacts mainly integrity (I:H) and availability (A:H) but not confidentiality (C:N). An attacker with local access to the system can exploit this flaw to delete critical backup files, potentially causing data loss or disruption of backup and recovery operations. The vulnerability does not require authentication or user interaction, increasing its risk in environments where local access is possible. Although no public exploits have been reported yet, the potential impact on backup integrity and availability is significant. The lack of a patch at the time of disclosure necessitates immediate mitigation through access control and monitoring.
Potential Impact
The primary impact of CVE-2024-33672 is the potential for attackers to delete critical backup files, undermining the integrity and availability of backup data. This can lead to severe operational disruptions, data loss, and extended recovery times in the event of data corruption, ransomware attacks, or other incidents requiring backup restoration. Organizations relying heavily on Veritas NetBackup for data protection, especially in sectors like finance, healthcare, government, and large enterprises, face increased risk of business continuity interruptions. The vulnerability's exploitation does not compromise confidentiality but can cause significant damage by preventing restoration of systems and data. Since the attack requires local access but no privileges or user interaction, insider threats or attackers who have gained initial footholds on systems could leverage this vulnerability to escalate damage. The absence of known exploits in the wild currently limits immediate widespread impact, but the potential for future exploitation remains high.
Mitigation Recommendations
Until a patch is released by Veritas, organizations should implement strict access controls to limit local access to systems running NetBackup, especially the Multi-Threaded Agent component. Employ the principle of least privilege to restrict user accounts and service accounts that can interact with the backup agent. Monitor system logs and file system changes for unusual deletion activities related to backup files. Use host-based intrusion detection systems (HIDS) to detect suspicious behavior around backup directories. Network segmentation can help isolate backup servers from general user environments to reduce local access risk. Regularly back up backup configurations and metadata to separate secure locations to aid recovery if deletion occurs. Once Veritas releases a patch or update addressing this vulnerability, prioritize its deployment in all affected environments. Additionally, conduct security awareness training to highlight risks of local access compromise and enforce strong endpoint security controls to prevent initial breaches.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, India, Brazil, Netherlands, Singapore, South Korea
CVE-2024-33672: n/a
Description
CVE-2024-33672 is a high-severity vulnerability affecting Veritas NetBackup versions prior to 10. 4. The issue resides in the Multi-Threaded Agent component, which can be exploited by an unauthenticated attacker with local access to delete arbitrary protected files. The vulnerability does not impact confidentiality but can severely affect integrity and availability by enabling deletion of critical backup files. Exploitation requires local access but no user interaction or privileges, making it relatively easy to exploit in compromised environments. No known public exploits have been reported yet. Organizations relying on NetBackup for data protection should prioritize patching once updates become available and implement strict access controls to limit local access to the Multi-Threaded Agent. Countries with significant deployments of Veritas NetBackup, especially those with large enterprise and government sectors, are at higher risk. The vulnerability is classified as high severity with a CVSS score of 7. 7 due to its potential to disrupt backup integrity and availability.
AI-Powered Analysis
Technical Analysis
CVE-2024-33672 is a vulnerability discovered in Veritas NetBackup versions before 10.4, specifically in the Multi-Threaded Agent component. This agent can be manipulated to perform arbitrary file deletions on files that are otherwise protected by the backup system. The vulnerability is categorized under CWE-427, which relates to uncontrolled search path elements or improper file deletion. The CVSS 3.1 base score is 7.7, indicating high severity, with the vector indicating low attack complexity (AC:L), local attack vector (AV:L), no privileges required (PR:N), no user interaction (UI:N), and impacts mainly integrity (I:H) and availability (A:H) but not confidentiality (C:N). An attacker with local access to the system can exploit this flaw to delete critical backup files, potentially causing data loss or disruption of backup and recovery operations. The vulnerability does not require authentication or user interaction, increasing its risk in environments where local access is possible. Although no public exploits have been reported yet, the potential impact on backup integrity and availability is significant. The lack of a patch at the time of disclosure necessitates immediate mitigation through access control and monitoring.
Potential Impact
The primary impact of CVE-2024-33672 is the potential for attackers to delete critical backup files, undermining the integrity and availability of backup data. This can lead to severe operational disruptions, data loss, and extended recovery times in the event of data corruption, ransomware attacks, or other incidents requiring backup restoration. Organizations relying heavily on Veritas NetBackup for data protection, especially in sectors like finance, healthcare, government, and large enterprises, face increased risk of business continuity interruptions. The vulnerability's exploitation does not compromise confidentiality but can cause significant damage by preventing restoration of systems and data. Since the attack requires local access but no privileges or user interaction, insider threats or attackers who have gained initial footholds on systems could leverage this vulnerability to escalate damage. The absence of known exploits in the wild currently limits immediate widespread impact, but the potential for future exploitation remains high.
Mitigation Recommendations
Until a patch is released by Veritas, organizations should implement strict access controls to limit local access to systems running NetBackup, especially the Multi-Threaded Agent component. Employ the principle of least privilege to restrict user accounts and service accounts that can interact with the backup agent. Monitor system logs and file system changes for unusual deletion activities related to backup files. Use host-based intrusion detection systems (HIDS) to detect suspicious behavior around backup directories. Network segmentation can help isolate backup servers from general user environments to reduce local access risk. Regularly back up backup configurations and metadata to separate secure locations to aid recovery if deletion occurs. Once Veritas releases a patch or update addressing this vulnerability, prioritize its deployment in all affected environments. Additionally, conduct security awareness training to highlight risks of local access compromise and enforce strong endpoint security controls to prevent initial breaches.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-04-26T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c44b7ef31ef0b561c1e
Added to database: 2/25/2026, 9:40:20 PM
Last enriched: 2/26/2026, 4:33:59 AM
Last updated: 2/26/2026, 8:01:42 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.