vulnerability

Veritas Enterprise Vault: CVE-2020-36164: Enterprise Vault OpenSSL vulnerability

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Dec 23, 2020
Added
Jul 3, 2025
Modified
Sep 12, 2025

Description

On start-up, the Enterprise Vault application loads the OpenSSL library. The OpenSSL library then attempts to load the openssl.cnf configuration file which does not exist at the following locations in both the System drive (typically C:\) and the Enterprise Vault installation drive (typically not C:\): SMTP Server: \Isode\etc\ssl\openssl.cnf. By default, on Windows systems, users can create directories under C:\. A low privileged user on the Windows system without any privileges in Enterprise Vault can create a openssl.cnf configuration file at the paths specified above to load a malicious OpenSSL engine resulting in arbitrary code execution as SYSTEM when the service starts. This gives the attacker administrator access on the system, allowing the attacker (by default) to access all data, to access all installed applications, etc.

Solution

veritas-enterprise-vault-upgrade-latest
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.