CA.ARCserve.axis2.Remote.Code.Execution

description-logoDescription

This indicates an attempt to exploit a code-execution vulnerability in Computer Associates ARCserve D2D.
This is a security bypass error which may allow remote attackers to execute arbitrary code by using the default username and password: admin/axis2.

affected-products-logoAffected Products

Computer Associates ARCserve D2D r15 Web Service Apache Axis2 World Accessible Servlet

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Modify the default password for the "admin" username in "\WebServiceImpl\WEB-INF\conf\axis2.xml".

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-01-30 15.768 Sig Added
2018-12-27 13.514 Sig Added
2018-10-26 13.480 Sig Added
2018-10-16 13.473 Sig Added