Article Details

Scrape Timestamp (UTC): 2025-08-21 16:42:20.773

Source: https://thehackernews.com/2025/08/pre-auth-exploit-chains-found-in.html

Original Article Text

Click to Toggle View

Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks. Commvault has released updates to address four security gaps that could be exploited to achieve remote code execution on susceptible instances. The list of vulnerabilities, identified in Commvault versions before 11.36.60, is as follows - watchTowr Labs researchers Sonny Macdonald and Piotr Bazydlo have been credited with discovering and reporting the four security defects in April 2025. All the flagged vulnerabilities have been resolved in versions 11.32.102 and 11.36.60. Commvault SaaS solution is not affected. In an analysis published Wednesday, the cybersecurity company said threat actors could fashion these vulnerabilities into two pre-authenticated exploit chains to achieve code execution on susceptible instances: One that combines CVE-2025-57791 and CVE-2025-57790, and the other that strings CVE-2025-57788, CVE-2025-57789, and CVE-2025-57790. It's worth noting that the second pre-auth remote code execution chain becomes successful only if the built-in admin password hasn't been changed since installation. The disclosure comes nearly four months after watchTowr Labs reported a critical Commvault Command Center flaw (CVE-2025-34028, CVSS score: 10.0) that could allow arbitrary code execution on affected installations. A month later, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.

Daily Brief Summary

VULNERABILITIES // Commvault Vulnerabilities Patched to Prevent Remote Code Execution Risks

Commvault has issued updates to fix four security vulnerabilities that could lead to remote code execution, affecting versions prior to 11.36.60.

Researchers from watchTowr Labs identified these flaws, which were reported in April 2025, highlighting potential exploitation risks.

The vulnerabilities can be exploited through two pre-authenticated exploit chains; one requires unchanged admin passwords for successful execution.

Commvault's SaaS solution remains unaffected by these vulnerabilities, ensuring continuity for cloud-based users.

The updates resolve issues in versions 11.32.102 and 11.36.60, mitigating risks associated with the identified security gaps.

CISA previously added a related critical vulnerability to its Known Exploited Vulnerabilities catalog, indicating active exploitation concerns.

Organizations using affected Commvault versions are urged to apply the latest patches to safeguard against potential remote code execution threats.