Intrusion Prevention

Arcserve.D2D.getNews.External.Entity.Injection

Description

This indicates an attack attempt to exploit an External Entity Injection Vulnerability in Arcserve D2D.
The vulnerability is due to insufficient validation of XML data in the getNews method. A remote, unauthenticated attacker could exploit this vulnerability by sending malicious XML data in the HTTP requests to the target server. Successful exploitation could result in the disclosure of information in the context of SYSTEM.

Affected Products

Arcserve D2D 15.0
Arcserve D2D 16.0
Arcserve D2D 16.5

Impact

Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.

Recommended Actions

Apply the most recent upgrade or patch from the vendor.
https://support.arcserve.com/s/article/P00002159?language=en_US

CVE References

CVE-2020-27858