Short Name |
APP:CA:ARCSRV:D2D-AXIS2-RCE |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
APP |
Keywords |
CA ARCserve D2D Axis2 Default Credentials Remote Code Execution |
Release Date |
2013/05/29 |
Update Number |
2268 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in CA ARCserve D2D Axis2. A successful attack can leverage this vulnerability to upload a malicious web service to a target system, enabling arbitrary code execution within the security context of the server.
The 'Axis2' component of Computer Associates ARCserve D2D is prone to a vulnerability that allows attackers to bypass certain security restrictions. An attacker can exploit this issue to bypass certain security restrictions and gain access to the application. Successfully exploiting this issue will allow attackers to execute arbitrary code with SYSTEM-level privileges, completely compromising the computer. Computer Associates ARCserve D2D r15 is vulnerable. Other products from multiple vendors that embed the 'Axis2' component may also be affected.