Skip to main content

Commvault Releases Security Updates to Address Multiple Vulnerabilities

Security researchers have demonstrated that 4 vulnerabilities in Commvault can be exploited in a chain to achieve unauthenticated remote code execution

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Security researchers have demonstrated that 4 vulnerabilities in Commvault can be exploited in a chain to achieve unauthenticated remote code execution


Threat details

Public proof-of-concept exploit available

Security researchers at watchTowr have published technical details for how the vulnerabilities in Commvault can be exploited in 2 different chains to achieve pre-authentication remote code execution (RCE). 

Backup and disaster recovery solutions are highly valuable targets for cyber criminals. The NHS England National CSOC assesses future exploitation as likely.


Introduction

Commvault has released security advisories to address 4 vulnerabilities in Commvault Windows and Linux. Security researchers have demonstrated the ability for these vulnerabilities to be chained together by an unauthenticated remote attacker to perform remote code execution on the Commvault server.

  • CVE-2025-57788 - Unauthorized API Access Risk - CVSSv4 6.9
  • CVE-2025-57789 - Vulnerability in Initial Administrator Login Process - CVSSv4 5.3
  • CVE-2025-57790 - Path Traversal Vulnerability - CVSSv4 8.7
  • CVE-2025-57791 - Argument Injection Vulnerability in CommServe - CVSSv4 6.9

Remediation advice

Affected organisations are strongly encouraged to review the Commvault Security Advisories page and apply the relevant updates as soon as possible.

For clarity, the remediated versions are:

  • 11.32.102
  • 11.36.60
  • 11.38.32


Last edited: 21 August 2025 3:00 pm