This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Vertica. Authentication is not required to exploit this vulnerability. The specific flaw exists within the vertica-udx-zygote process, which listens on a random port in the ephemeral range. This process accepts an unauthenticated command packet to execute an arbitrary command under the context of dbadmin.