Data: 2025-08-27 20:49:11
Autor: Inteligência Against Invaders
2025-074
08/20/2025
Multiple vulnerabilities have been discovered in Commvault Backup & Recovery, which when chained together, could allow for remote code execution. Commvault Backup & Recovery is a comprehensive data protection solution that offers a range of services for safeguarding data across various environments, including on-premises, cloud, and hybrid setups. Successful exploitation of these vulnerabilities could allow an attacker to bypass authentication, escalate privileges, run arbitrary commands, and potentially drop a JSP webshell.
Researchers from watchTowr Labs have posted a detailed write-up about the vulnerabilities on their website.
Large and medium government entitiesHIGH
Small governmentMEDIUM
Large and medium business entitiesHIGH
Small business entitiesMEDIUM
Multiple vulnerabilities have been discovered in Commvault Backup & Recovery, which could allow for remote code execution.Details of the vulnerabilities are as follows:
Tactic: Initial Access (TA0001):
Technique: Exploit Public-Facing Application (T1190):
The vulnerabilities can be exploited as part of two separate remote code execution (RCE) chains. One chain works only of the if the built-in admin password hasn’t been changed since installation, and relies on exploiting CVE-2025-57788 (for bypassing authentication), CVE-2025-57789 (to escalate privileges), and CVE-2025-57790 to achieve RCE. The second chain, which works against any unpatched Commvault instance, uses CVE-2025-57791 to bypass authentication and CVE-2025-57790 for RCE (by injecting a webshell).
We recommend the following actions be taken: