Friday, August 22, 2025

Pre-Auth Exploit Chains Present in Commvault Might Allow Distant Code Execution Assaults

Aug 21, 2025Ravie LakshmananVulnerability / Software program Safety

Pre-Auth Exploit Chains Present in Commvault Might Allow Distant Code Execution Assaults

Commvault has launched updates to deal with 4 safety gaps that might be exploited to realize distant code execution on inclined cases.

The listing of vulnerabilities, recognized in Commvault variations earlier than 11.36.60, is as follows –

  • CVE-2025-57788 (CVSS rating: 6.9) – A vulnerability in a identified login mechanism permits unauthenticated attackers to execute API calls with out requiring person credentials
  • CVE-2025-57789 (CVSS rating: 5.3) – A vulnerability through the setup part between set up and the primary administrator login that permits distant attackers to use the default credentials to achieve admin management
  • CVE-2025-57790 (CVSS rating: 8.7) – A path traversal vulnerability that permits distant attackers to carry out unauthorized file system entry via a path traversal problem, leading to distant code execution
  • CVE-2025-57791 (CVSS rating: 6.9) – A vulnerability that permits distant attackers to inject or manipulate command-line arguments handed to inner parts on account of inadequate enter validation, leading to a legitimate person session for a low-privilege function
Cybersecurity

watchTowr Labs researchers Sonny Macdonald and Piotr Bazydlo have been credited with discovering and reporting the 4 safety defects in April 2025. All of the flagged vulnerabilities have been resolved in variations 11.32.102 and 11.36.60. Commvault SaaS resolution isn’t affected.

In an evaluation revealed Wednesday, the cybersecurity firm mentioned menace actors might style these vulnerabilities into two pre-authenticated exploit chains to realize code execution on inclined cases: One that mixes CVE-2025-57791 and CVE-2025-57790, and the opposite that strings CVE-2025-57788, CVE-2025-57789, and CVE-2025-57790.

It is value noting that the second pre-auth distant code execution chain turns into profitable provided that the built-in admin password hasn’t been modified since set up.

The disclosure comes almost 4 months after watchTowr Labs reported a vital Commvault Command Heart flaw (CVE-2025-34028, CVSS rating: 10.0) that would permit arbitrary code execution on affected installations.

A month later, the U.S. Cybersecurity and Infrastructure Safety Company (CISA) added the vulnerability to its Recognized Exploited Vulnerabilities (KEV) catalog, citing proof of energetic exploitation within the wild.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles