- Description
- A heap-based buffer overflow vulnerability exists in the exists in the network-facing input handling routines of Arcserve Unified Data Protection (UDP). This flaw is reachable without authentication and results from improper bounds checking when processing attacker-controlled input. By sending specially crafted data, a remote attacker can corrupt heap memory, potentially causing a denial of service or enabling arbitrary code execution depending on the memory layout and exploitation techniques used. This vulnerability is similar in nature to CVE-2025-34522 but affects a separate code path or component. No user interaction is required, and exploitation occurs in the context of the vulnerable process. This vulnerability affects all UDP versions prior to 10.2. UDP 10.2 includes the necessary patches and requires no action. Versions 8.0 through 10.1 are supported and require either patch application or upgrade to 10.2. Versions 7.x and earlier are unsupported or out of maintenance and must be upgraded to 10.2 to remediate the issue.
- Source
- disclosure@vulncheck.com
- NVD status
- Analyzed
- Products
- udp
CVSS 4.0
- Type
- Secondary
- Base score
- 9.2
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- CRITICAL
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- disclosure@vulncheck.com
- CWE-122
- Hype score
- Not currently trending
⚠️ CRITICAL heap overflow in Arcserve UDP (CVE-2025-34523) risks remote code execution—no auth needed! Upgrade to 10.2 ASAP to secure backups. Affects versions 8.0–10.1. Details: https://t.co/gsDsuW7WfP #OffSe... https://t.co/brTmgGCpkS
@offseq
28 Aug 2025
69 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Identificador de Vulnerabilidad y Exposición Común CVE-2025-34523. 👉 https://t.co/j376jkOs2U https://t.co/kwPEI5djuO
@EnigmaSecurity_
28 Aug 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
😊 CVE-2025-34523 😊 👉 https://t.co/j376jkOs2U https://t.co/FBSSQytPzb
@EnigmaSecurity_
28 Aug 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-34523 Unauthenticated Heap Buffer Overflow in Arcserve UDP Network Input Handling https://t.co/1EzNZHzcJt
@VulmonFeeds
28 Aug 2025
21 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-34523 A heap-based buffer overflow vulnerability exists in the exists in the network-facing input handling routines of Arcserve Unified Data Protection (UDP). This flaw is … https://t.co/bbsHCP9bXS
@CVEnew
27 Aug 2025
564 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:arcserve:udp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "53D70153-E6B7-4D27-83AA-77817EBBBC3E",
"versionEndExcluding": "7.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arcserve:udp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7644D867-3950-4EBF-9CBE-644458C26801",
"versionEndExcluding": "10.2",
"versionStartIncluding": "8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arcserve:udp:7.0:-:*:*:*:*:*:*",
"matchCriteriaId": "1CAB17ED-9FBC-475F-8206-3BC8E672C719",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arcserve:udp:7.0:update_1:*:*:*:*:*:*",
"matchCriteriaId": "8672F05B-B0FC-4A81-8D5B-2A7DE8C6D92D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arcserve:udp:7.0:update_2:*:*:*:*:*:*",
"matchCriteriaId": "1379C0DE-8BB0-47FF-AE56-6E54F125E5A0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]