Home

Description

An authentication bypass vulnerability in Arcserve Unified Data Protection (UDP) allows unauthenticated attackers to gain unauthorized access to protected functionality or user accounts. By manipulating specific request parameters or exploiting a logic flaw, an attacker can bypass login mechanisms without valid credentials and access administrator-level features. This vulnerability affects all UDP versions prior to 10.2. UDP 10.2 includes the necessary patches and requires no action. Versions 8.0 through 10.1 are supported and require either patch application or upgrade to 10.2. Versions 7.x and earlier are unsupported or out of maintenance and must be upgraded to 10.2 to remediate the issue.

PUBLISHED Reserved 2025-04-15 | Published 2025-08-27 | Updated 2025-08-29 | Assigner VulnCheck




HIGH: 7.7CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-288 Authentication Bypass Using an Alternate Path or Channel

Product status

Default status
unaffected

10.2
unaffected

8.0
affected

*
affected

Credits

watchTowr finder

References

support.arcserve.com/...cserve-UDP-customers-on-all-versions vendor-advisory patch

cve.org (CVE-2025-34520)

nvd.nist.gov (CVE-2025-34520)

Download JSON