PatchSiren cyber security CVE debrief
CVE-2017-6408 Veritas CVE debrief
CVE-2017-6408 describes a local privilege-escalation race condition in Veritas NetBackup’s pbx_exchange component. According to the NVD record, a local user may be able to connect to a socket before permissions are secured, creating an opportunity to gain elevated access. The issue affects NetBackup 8.0 and earlier, and NetBackup Appliance 3.0 and earlier. Because the weakness is local and requires a race window, it is primarily a host-hardening and patch-management concern, but it can still have high impact where untrusted local accounts exist.
- Vendor
- Veritas
- Product
- CVE-2017-6408
- CVSS
- HIGH 7
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-03-02
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-03-02
- Advisory updated
- 2026-05-13
Who should care
Administrators of Veritas NetBackup and NetBackup Appliance deployments, especially systems that allow interactive local users, shared administrative access, or other untrusted local execution contexts. Security teams responsible for backup infrastructure should prioritize it because backup platforms are high-value targets.
Technical summary
The official NVD record classifies the flaw as CVE-2017-6408 with CVSS v3.0 vector CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H and CWE-362. The described condition is a race in pbx_exchange: if a local user reaches a socket before permissions are secured, the process can be manipulated in a way that enables local privilege escalation. The affected versions listed in the source corpus are Veritas NetBackup 8.0 and earlier, and NetBackup Appliance 3.0 and earlier.
Defensive priority
High. The issue requires local access and a race condition, but the potential impact is full confidentiality, integrity, and availability compromise on the affected host. Backup servers are especially sensitive because compromise can threaten both production recovery capability and the integrity of stored backups.
Recommended defensive actions
- Verify whether any deployed Veritas NetBackup or NetBackup Appliance instances are at or below the affected version ranges listed in the advisory metadata.
- Review the vendor advisory linked from the NVD record for remediation guidance and apply the vendor-recommended update or mitigation.
- Reduce exposure to untrusted local access on backup servers, including minimizing shared accounts and restricting interactive logins where operationally possible.
- Monitor systems for unexpected local privilege escalation behavior or anomalous activity around pbx_exchange and related socket-handling processes.
- Use asset inventory and patch-management tooling to ensure backup infrastructure is tracked separately and remediated promptly when security advisories are issued.
Evidence notes
This debrief is limited to the supplied source corpus and official records. The core facts used here come from the NVD CVE metadata: the vulnerability description, affected product/version ranges, CVSS vector, and CWE-362 classification. The corpus also includes a Veritas vendor advisory reference (VTS17-003) and secondary references to SecurityFocus and SecurityTracker, but their contents were not fetched, so no additional claims are made beyond the metadata provided.
Official resources
-
CVE-2017-6408 CVE record
CVE.org
-
CVE-2017-6408 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
- Source reference
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
CVE-2017-6408 was published on 2017-03-02T06:59:01.120Z. The record was modified on 2026-05-13T00:24:29.033Z in NVD metadata, which should not be treated as the original issue date.