Commvault Confirms Nation-State Attack via Zero-Day Exploit in Azure Environment
Commvault has confirmed that a nation-state threat actor exploited a zero-day vulnerability (CVE-2025-3928) to gain access to its Azure cloud environment in February 2025.
Key facts:
- Breach was first detected after Microsoft flagged suspicious activity on Feb 20.
- Attackers exploited a flaw in Commvault Web Server software to plant webshells.
- Exploit required authenticated access, suggesting credential theft or prior compromise.
- Customer backup data remained unaffected, and Commvault operations were not disrupted.
CISA has now added CVE-2025-3928 to its Known Exploited Vulnerabilities catalog.
- Federal agencies must secure affected systems by May 19, 2025.
- The vulnerability has a CVSS score of 8.8 — a high-severity threat vector.
Commvault’s response included:
- Immediate credential rotation
- Partnership with two leading cybersecurity firms, the FBI, and CISA
- New guidance for customers on Azure Conditional Access, secret rotation, and IP monitoring
- Blocklist of known malicious IPs published for proactive defense
This breach highlights how even security vendors are now being targeted by advanced threat actors — especially those with deep access to enterprise infrastructure.
At @Efani, we believe that protecting mobile and cloud infrastructure isn’t optional anymore. It’s mission-critical.
No system is immune. But full transparency and rapid action — like Commvault demonstrated — sets the standard for how we fight back.