Impact of eDiscovery Platform Cleartext Password on Command Line Vulnerability
A vulnerability was discovered in the Arctera eDiscovery Platform version 10.3.1 and prior due to execution of the EVSearcher bat file where the password is passed in plain text to the command line. This vulnerability only impacts implementations where the eDiscovery Platform is configured to collect from the Arctera Enterprise Vault application. In these configurations the Arctera Enterprise Vault credentials may be exposed to tools capturing system activity if they are installed on the eDiscovery Platform server.
Affected Versions
Arctera/Veritas eDiscovery Platform versions: 10.3.1, 10.3, 10.2.7, 10.2.6, 10.2.5, 10.2.4, 10.2.3, 10.2.2, 10.2.1, 10.2. Earlier unsupported versions may be affected as well.
About Remediation
To check updates on the remediation steps, please refer to the Security Advisory here:
www.veritas.com/content/support/en_US/security/ARC25-005Disclaimer
THE SECURITY ADVISORY IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. VERITAS TECHNOLOGIES LLC SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.