CVE-2025-34523
BaseFortify
Publication date: 2025-08-27
Last updated on: 2025-09-09
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| arcserve | udp | to 7.0 (exc) |
| arcserve | udp | From 8.0 (inc) to 10.2 (exc) |
| arcserve | udp | 7.0 |
| arcserve | udp | 7.0 |
| arcserve | udp | 7.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-122 | A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc(). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a heap-based buffer overflow in the network-facing input handling routines of Arcserve Unified Data Protection (UDP). It occurs due to improper bounds checking when processing attacker-controlled input, allowing a remote attacker to send specially crafted data that corrupts heap memory. This can lead to denial of service or arbitrary code execution without requiring authentication or user interaction.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing a remote attacker to cause a denial of service or execute arbitrary code on the affected system. This could disrupt your data protection services or allow an attacker to take control of the vulnerable process, potentially compromising system integrity and availability.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should upgrade Arcserve Unified Data Protection (UDP) to version 10.2 or later, as this version includes the necessary patches. If you are running versions 8.0 through 10.1, apply the patch or upgrade to 10.2. Versions 7.x and earlier are unsupported and must be upgraded to 10.2 to remediate the issue.