
Significant Vulnerabilities Discovered in Commvault Software
In a striking revelation, Commvault has acknowledged the presence of multiple security vulnerabilities that could result in remote code execution on its software. The vulnerabilities, targeted in versions prior to 11.36.60, were uncovered by researchers from watchTowr Labs and include a variety of significant flaws:
- CVE-2025-57788: An issue with the login mechanism allowing unauthenticated API calls (CVSS score: 6.9).
- CVE-2025-57789: Weaknesses in the installation process permitting the use of default credentials to gain administrative access (CVSS score: 5.3).
- CVE-2025-57790: A severe path traversal flaw leading to unauthorized file system access and potential code execution (CVSS score: 8.7).
- CVE-2025-57791: Insufficient input validation that could lead to command injection and unauthorized session validation for low-privilege roles (CVSS score: 6.9).
All the vulnerabilities have now been resolved in Commvault's latest versions, 11.32.102 and 11.36.60, and customers using the Commvault SaaS solution are not affected by these flaws.
Potential Exploit Chains Lengthen Threat Landscape
Researchers have indicated that these vulnerabilities can be exploited through two pre-authenticated exploit chains. The first one combines CVE-2025-57791 and CVE-2025-57790, while the second chain links CVE-2025-57788, CVE-2025-57789, and CVE-2025-57790. A crucial note for businesses is that the efficacy of the second exploit chain hinges on whether the admin password has remained unchanged since installation.
This disclosure follows a previous warning about another critical vulnerability, CVE-2025-34028, which holds a CVSS score of 10.0 and could lead to arbitrary code execution. This vulnerability was so severe that it found its way into the U.S. Cybersecurity and Infrastructure Security Agency's (CISA) Known Exploited Vulnerabilities (KEV) catalog due to ongoing active exploitation.
Implications for Cybersecurity Stakeholders
These vulnerabilities highlight an ongoing trend in cybersecurity where software security gaps present significant risks for companies and individuals alike. As attackers become more sophisticated, it's paramount for organizations utilizing Commvault solutions to implement the latest updates and maintain good security hygiene, such as changing default credentials promptly.
As threats evolve, so too must the defenses. Stakeholders are encouraged to stay informed and adopt recommended best practices to safeguard their systems from emerging vulnerabilities.
Write A Comment