![]() ![]() And today, there’s one channel where more potential customers are than anywhere else: live chat. Over the years, we have consistently emphasized our core philosophy around customer messaging – send the right message, to the right person, at the right time, in the right place. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.A great customer experience is about meeting people where they already are, and our comprehensive live chat guide is here to help you do just that. VERITAS TECHNOLOGIES LLC SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE SECURITY ADVISORY IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. See the Veritas Download Center for available updates: Questionsįor questions or problems regarding these vulnerabilities please contact Veritas Technical Support ( ) Disclaimer ![]() RemediationĬustomers under a current maintenance contract should update to the NetBackup IT Analytics Version 11.2.0. Earlier unsupported versions of APTARE IT Analytics are affected as well. Veritas NetBackup IT Analytics Versions 11.1 and 11.0. The malicious actor would require administrative/root role access to the NetBackup IT Analytics Portal Server to install the unauthentic component. ![]() (CWE-347: Improper Verification of Cryptographic Signature) Prerequisites CVSS v3.1 Base Score 5.3 ( AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)Ī malicious actor could install rogue Collector executable files (aptare.jar, upgrademanager.zip) on the NetBackup IT Analytics Portal server which might then be downloaded and installed on collectors.The Veritas NetBackup IT Analytics application upgrade process included unsigned files which could be exploited and result in a customer installing unauthentic components. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |