Who is this article for?
CrashPlan for Enterprise, yes.
Code42 for Enterprise, yes.
CrashPlan for Small Business, yes.
This article provides advisories about security vulnerabilities in Code42 products. These security vulnerabilities have been submitted to the Mitre Common Vulnerabilities and Exposures (CVE) list.
To protect the security of our customers, we don't publish a security advisory until a vulnerability has been fully investigated and a patch or update is available that resolves the issue.
If you have questions or concerns, contact our Customer Champions for support.
Click the title of the advisory for more information, including affected versions and the version that you should upgrade to in order to resolve the issue.
|July 6, 2020||Remote code execution on Code42 servers|
|November 15, 2019||
|September 16, 2019||Arbitrary file creation on Code42 servers|
|August 19, 2019||Users can restore files to locations they do not have write access to|
|July 11, 2019||Privilege Escalation in LoginToken API|
|July 11, 2019||Untrusted data is executed as System via a PAC file read by CrashPlanService.exe|
|December 13, 2018||Permissions vulnerability in Code42 app on Linux|
Sign up for email notifications
If you want to be notified when Code42 identifies a security vulnerability, navigate to the Code42 email preferences page and check the box "Common Security and Vulnerability Reports" in the preferences form.
- Code42: Security