Directory traversal vulnerability in Arcserve UDP before 5.0 Update 4 allows remote attackers to obtain sensitive information or cause a denial of service via a crafted file path to the (1) reportFileServlet or (2) exportServlet servlet.
http://www.zerodayinitiative.com/advisories/ZDI-15-242/
http://www.zerodayinitiative.com/advisories/ZDI-15-241/
https://blog.checkpoint.com/security/october-2024s-most-wanted-malware-infostealers-surge-as-cyber-criminals-leverage-innovative-attack-vectors/
https://blog.checkpoint.com/research/july-2024s-most-wanted-malware-remcos-and-ransomhub-run-rampant/
https://blog.checkpoint.com/security/march-2024s-most-wanted-malware-hackers-discover-new-infection-chain-method-to-deliver-remcos/
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-4068
http://documentation.arcserve.com/Arcserve-UDP/Available/V5/ENU/Bookshelf_Files/HTML/Update%204/UDP_Update4_ReleaseNotes.html
Source: Mitre, NVD
Published: 2015-05-29
Updated: 2025-10-22
Known Exploited Vulnerability (KEV)
Base Score: 9.4
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:C
Severity: High
Base Score: 9.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Severity: Critical
EPSS: 0.84121