Skip to main content

Commvault Releases Security Updates for Command Center

Updates address a critical path traversal vulnerability leading to remote code execution

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Updates address a critical path traversal vulnerability leading to remote code execution


Affected platforms

The following platforms are known to be affected:

Threat details

CVE-2025-34028 exploited in-the-wild

The US Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-34028 to the Known Exploited Vulnerabilities (KEV) catalogue.

Additionally, a proof-of-concept (PoC) exploit has been released for CVE-2025-34028. The NHS England National CSOC assess exploitation of this vulnerability as more likely.


Introduction

Commvault has released a security advisory to address a critical vulnerability in its Command Center Platform. Command Center is Commvault's all-in-one solution for managing Commvault services within a corporate environment.

CVE-2025-34028 is a path traversal vulnerability with a CVSSv3 base score of 10.0, and if exploited could allow an unauthenticated attacker to upload ZIP files. The ZIP files may then be expanded by the target server which could then result in remote code execution (RCE).


Threat updates

Date Update
30 Apr 2025 CVE-2025-34028 added to CISA's Known Exploited Vulnerabilities catalogue

Remediation advice

Affected organisations are encouraged to review the Commvault security advisory CV_2025_04_1 and apply the relevant updates as soon as practicable. 



Last edited: 30 April 2025 10:56 am