Vulnerabilites related to Veeam - Backup & Replication
CVE-2024-42453 (GCVE-0-2024-42453)
Vulnerability from cvelistv5
Published
2024-12-04 01:06
Modified
2024-12-04 14:54
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability Veeam Backup & Replication allows low-privileged users to control and modify configurations on connected virtual infrastructure hosts. This includes the ability to power off virtual machines, delete files in storage, and make configuration changes, potentially leading to Denial of Service (DoS) and data integrity issues. The vulnerability is caused by improper permission checks in methods accessed via management services.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup & Replication |
Version: 12.2 ≤ 12.2 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42453", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T14:53:56.348517Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T14:54:37.763Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup \u0026 Replication", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.2", "status": "affected", "version": "12.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability Veeam Backup \u0026 Replication allows low-privileged users to control and modify configurations on connected virtual infrastructure hosts. This includes the ability to power off virtual machines, delete files in storage, and make configuration changes, potentially leading to Denial of Service (DoS) and data integrity issues. The vulnerability is caused by improper permission checks in methods accessed via management services." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T01:06:04.668Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4693" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-42453", "datePublished": "2024-12-04T01:06:04.668Z", "dateReserved": "2024-08-02T01:04:07.985Z", "dateUpdated": "2024-12-04T14:54:37.763Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-45204 (GCVE-0-2024-45204)
Vulnerability from cvelistv5
Published
2024-12-04 01:06
Modified
2024-12-06 20:10
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability exists where a low-privileged user can exploit insufficient permissions in credential handling to leak NTLM hashes of saved credentials. The exploitation involves using retrieved credentials to expose sensitive NTLM hashes, impacting systems beyond the initial target and potentially leading to broader security vulnerabilities.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup & Replication |
Version: 12.2 ≤ 12.2 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45204", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T14:46:20.732535Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-06T20:10:23.572Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup \u0026 Replication", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.2", "status": "affected", "version": "12.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability exists where a low-privileged user can exploit insufficient permissions in credential handling to leak NTLM hashes of saved credentials. The exploitation involves using retrieved credentials to expose sensitive NTLM hashes, impacting systems beyond the initial target and potentially leading to broader security vulnerabilities." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T01:06:05.328Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4693" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-45204", "datePublished": "2024-12-04T01:06:05.328Z", "dateReserved": "2024-08-23T01:00:01.060Z", "dateUpdated": "2024-12-06T20:10:23.572Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42451 (GCVE-0-2024-42451)
Vulnerability from cvelistv5
Published
2024-12-04 01:06
Modified
2024-12-04 14:53
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability in Veeam Backup & Replication allows low-privileged users to leak all saved credentials in plaintext. This is achieved by calling a series of methods over an external protocol, ultimately retrieving the credentials using a malicious setup on the attacker's side. This exposes sensitive data, which could be used for further attacks, including unauthorized access to systems managed by the platform.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup & Replication |
Version: 12.2 ≤ 12.2 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42451", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T14:53:37.311607Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-312", "description": "CWE-312 Cleartext Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T14:53:46.665Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup \u0026 Replication", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.2", "status": "affected", "version": "12.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Veeam Backup \u0026 Replication allows low-privileged users to leak all saved credentials in plaintext. This is achieved by calling a series of methods over an external protocol, ultimately retrieving the credentials using a malicious setup on the attacker\u0027s side. This exposes sensitive data, which could be used for further attacks, including unauthorized access to systems managed by the platform." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T01:06:04.677Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4693" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-42451", "datePublished": "2024-12-04T01:06:04.677Z", "dateReserved": "2024-08-02T01:04:07.984Z", "dateUpdated": "2024-12-04T14:53:46.665Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42457 (GCVE-0-2024-42457)
Vulnerability from cvelistv5
Published
2024-12-04 01:06
Modified
2024-12-04 16:00
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability in Veeam Backup & Replication allows users with certain operator roles to expose saved credentials by leveraging a combination of methods in a remote management interface. This can be achieved using a session object that allows for credential enumeration and exploitation, leading to the leak of plaintext credentials to a malicious host. The attack is facilitated by improper usage of a method that allows operators to add a new host with an attacker-controlled IP, enabling them to retrieve sensitive credentials in plaintext.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup & Replication |
Version: 12.2 ≤ 12.2 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42457", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T15:47:05.862624Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-522", "description": "CWE-522 Insufficiently Protected Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T16:00:32.213Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup \u0026 Replication", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.2", "status": "affected", "version": "12.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Veeam Backup \u0026 Replication allows users with certain operator roles to expose saved credentials by leveraging a combination of methods in a remote management interface. This can be achieved using a session object that allows for credential enumeration and exploitation, leading to the leak of plaintext credentials to a malicious host. The attack is facilitated by improper usage of a method that allows operators to add a new host with an attacker-controlled IP, enabling them to retrieve sensitive credentials in plaintext." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T01:06:04.658Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4693" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-42457", "datePublished": "2024-12-04T01:06:04.658Z", "dateReserved": "2024-08-02T01:04:07.985Z", "dateUpdated": "2024-12-04T16:00:32.213Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-29851 (GCVE-0-2024-29851)
Vulnerability from cvelistv5
Published
2024-05-22 22:55
Modified
2024-09-19 01:50
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Veeam Backup Enterprise Manager allows high-privileged users to steal NTLM hash of Enterprise manager service account.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup & Replication |
Version: 12.1.2.172 ≤ |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:backup_enterprise_manager:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "backup_enterprise_manager", "vendor": "veeam", "versions": [ { "lessThan": "12.1.2.172", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-29851", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-23T17:21:21.254544Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-294", "description": "CWE-294 Authentication Bypass by Capture-replay", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-19T01:50:16.524Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:17:58.142Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://veeam.com/kb4581" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Backup \u0026 Replication", "vendor": "Veeam", "versions": [ { "lessThan": "12.1.2.172", "status": "affected", "version": "12.1.2.172", "versionType": "semver" }, { "lessThanOrEqual": "11", "status": "unaffected", "version": "11", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Veeam Backup Enterprise Manager allows high-privileged users to steal NTLM hash of Enterprise manager service account." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-05-22T22:55:11.273Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://veeam.com/kb4581" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-29851", "datePublished": "2024-05-22T22:55:11.273Z", "dateReserved": "2024-03-21T01:04:07.089Z", "dateUpdated": "2024-09-19T01:50:16.524Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42452 (GCVE-0-2024-42452)
Vulnerability from cvelistv5
Published
2024-12-04 01:06
Modified
2024-12-04 16:03
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability in Veeam Backup & Replication allows a low-privileged user to start an agent remotely in server mode and obtain credentials, effectively escalating privileges to system-level access. This allows the attacker to upload files to the server with elevated privileges. The vulnerability exists because remote calls bypass permission checks, leading to full system compromise.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup & Replication |
Version: 12.2 ≤ 12.2 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:agent:*:*:*:*:*:windows:*:*" ], "defaultStatus": "unknown", "product": "agent", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "12.2.0.334", "status": "affected", "version": "12.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42452", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T16:01:00.432136Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T16:03:26.578Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup \u0026 Replication", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.2", "status": "affected", "version": "12.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Veeam Backup \u0026 Replication allows a low-privileged user to start an agent remotely in server mode and obtain credentials, effectively escalating privileges to system-level access. This allows the attacker to upload files to the server with elevated privileges. The vulnerability exists because remote calls bypass permission checks, leading to full system compromise." } ], "metrics": [ { "cvssV3_0": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T01:06:04.654Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4693" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-42452", "datePublished": "2024-12-04T01:06:04.654Z", "dateReserved": "2024-08-02T01:04:07.984Z", "dateUpdated": "2024-12-04T16:03:26.578Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-29849 (GCVE-0-2024-29849)
Vulnerability from cvelistv5
Published
2024-05-22 22:55
Modified
2024-09-19 01:38
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Veeam Backup Enterprise Manager allows unauthenticated users to log in as any user to enterprise manager web interface.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup & Replication |
Version: 12.1.2.172 ≤ Version: 11.0.1.1261 P20240304 ≤ |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:backup_enterprise_manager:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "backup_enterprise_manager", "vendor": "veeam", "versions": [ { "lessThan": "12.1.2.172", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-29849", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T01:37:31.279055Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-19T01:38:17.699Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:17:58.438Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://veeam.com/kb4581" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup \u0026 Replication", "vendor": "Veeam", "versions": [ { "lessThan": "12.1.2.172", "status": "affected", "version": "12.1.2.172", "versionType": "semver" }, { "lessThan": "11.0.1.1261 P20240304", "status": "affected", "version": "11.0.1.1261 P20240304", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Veeam Backup Enterprise Manager allows unauthenticated users to log in as any user to enterprise manager web interface." } ], "metrics": [ { "cvssV3_0": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-05-22T22:55:11.237Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://veeam.com/kb4581" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-29849", "datePublished": "2024-05-22T22:55:11.237Z", "dateReserved": "2024-03-21T01:04:07.089Z", "dateUpdated": "2024-09-19T01:38:17.699Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42455 (GCVE-0-2024-42455)
Vulnerability from cvelistv5
Published
2024-12-04 01:06
Modified
2024-12-05 10:59
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability in Veeam Backup & Replication allows a low-privileged user to connect to remoting services and exploit insecure deserialization by sending a serialized temporary file collection. This exploit allows the attacker to delete any file on the system with service account privileges. The vulnerability is caused by an insufficient blacklist during the deserialization process.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup & Replication |
Version: 12.2 ≤ 12.2 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:backup_and_replication:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "backup_and_replication", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "12.2.0.334", "status": "affected", "version": "12.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42455", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-05T10:59:26.045567Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-05T10:59:46.913Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup \u0026 Replication", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.2", "status": "affected", "version": "12.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Veeam Backup \u0026 Replication allows a low-privileged user to connect to remoting services and exploit insecure deserialization by sending a serialized temporary file collection. This exploit allows the attacker to delete any file on the system with service account privileges. The vulnerability is caused by an insufficient blacklist during the deserialization process." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T01:06:04.626Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4693" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-42455", "datePublished": "2024-12-04T01:06:04.626Z", "dateReserved": "2024-08-02T01:04:07.985Z", "dateUpdated": "2024-12-05T10:59:46.913Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-29852 (GCVE-0-2024-29852)
Vulnerability from cvelistv5
Published
2024-05-22 22:55
Modified
2024-09-19 01:58
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Veeam Backup Enterprise Manager allows high-privileged users to read backup session logs.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup & Replication |
Version: 12.1.2.172 ≤ |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:backup_enterprise_manager:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "backup_enterprise_manager", "vendor": "veeam", "versions": [ { "lessThan": "12.1.2.172", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-29852", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T01:56:57.765252Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-280", "description": "CWE-280 Improper Handling of Insufficient Permissions or Privileges", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-19T01:58:15.369Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:17:58.340Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://veeam.com/kb4581" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup \u0026 Replication", "vendor": "Veeam", "versions": [ { "lessThan": "12.1.2.172", "status": "affected", "version": "12.1.2.172", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Veeam Backup Enterprise Manager allows high-privileged users to read backup session logs." } ], "metrics": [ { "cvssV3_0": { "baseScore": 2.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-05-22T22:55:11.272Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://veeam.com/kb4581" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-29852", "datePublished": "2024-05-22T22:55:11.272Z", "dateReserved": "2024-03-21T01:04:07.090Z", "dateUpdated": "2024-09-19T01:58:15.369Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-29850 (GCVE-0-2024-29850)
Vulnerability from cvelistv5
Published
2024-05-22 22:55
Modified
2024-09-19 01:50
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Veeam Backup Enterprise Manager allows account takeover via NTLM relay.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup & Replication |
Version: 12.1.2.172 ≤ |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:backup_enterprise_manager:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "backup_enterprise_manager", "vendor": "veeam", "versions": [ { "lessThan": "12.1.2.172", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-29850", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-12T20:20:49.075903Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-294", "description": "CWE-294 Authentication Bypass by Capture-replay", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-19T01:50:51.392Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:17:58.294Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://veeam.com/kb4581" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup \u0026 Replication", "vendor": "Veeam", "versions": [ { "lessThan": "12.1.2.172", "status": "affected", "version": "12.1.2.172", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Veeam Backup Enterprise Manager allows account takeover via NTLM relay." } ], "metrics": [ { "cvssV3_0": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-05-22T22:55:11.260Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://veeam.com/kb4581" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-29850", "datePublished": "2024-05-22T22:55:11.260Z", "dateReserved": "2024-03-21T01:04:07.089Z", "dateUpdated": "2024-09-19T01:50:51.392Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42456 (GCVE-0-2024-42456)
Vulnerability from cvelistv5
Published
2024-12-04 01:06
Modified
2024-12-04 16:48
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability in Veeam Backup & Replication platform allows a low-privileged user with a specific role to exploit a method that updates critical configuration settings, such as modifying the trusted client certificate used for authentication on a specific port. This can result in unauthorized access, enabling the user to call privileged methods and initiate critical services. The issue arises due to insufficient permission requirements on the method, allowing users with low privileges to perform actions that should require higher-level permissions.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup & Replication |
Version: 12.2 ≤ 12.2 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:backup_and_replication:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "backup_and_replication", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "12.2.0.334", "status": "affected", "version": "12.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42456", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T16:48:18.329521Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T16:48:57.686Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup \u0026 Replication", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.2", "status": "affected", "version": "12.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Veeam Backup \u0026 Replication platform allows a low-privileged user with a specific role to exploit a method that updates critical configuration settings, such as modifying the trusted client certificate used for authentication on a specific port. This can result in unauthorized access, enabling the user to call privileged methods and initiate critical services. The issue arises due to insufficient permission requirements on the method, allowing users with low privileges to perform actions that should require higher-level permissions." } ], "metrics": [ { "cvssV3_0": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T01:06:04.627Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4693" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-42456", "datePublished": "2024-12-04T01:06:04.627Z", "dateReserved": "2024-08-02T01:04:07.985Z", "dateUpdated": "2024-12-04T16:48:57.686Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-40717 (GCVE-0-2024-40717)
Vulnerability from cvelistv5
Published
2024-12-04 01:06
Modified
2025-03-13 17:40
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability in Veeam Backup & Replication allows a low-privileged user with certain roles to perform remote code execution (RCE) by updating existing jobs. These jobs can be configured to run pre- and post-scripts, which can be located on a network share and are executed with elevated privileges by default. The user can update a job and schedule it to run almost immediately, allowing arbitrary code execution on the server.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup & Replication |
Version: 12.2 ≤ 12.2 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:backup_and_replication:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "backup_and_replication", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "12.2.0.334", "status": "affected", "version": "12.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-40717", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T16:32:56.308114Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-13T17:40:27.483Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup \u0026 Replication", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.2", "status": "affected", "version": "12.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Veeam Backup \u0026 Replication allows a low-privileged user with certain roles to perform remote code execution (RCE) by updating existing jobs. These jobs can be configured to run pre- and post-scripts, which can be located on a network share and are executed with elevated privileges by default. The user can update a job and schedule it to run almost immediately, allowing arbitrary code execution on the server." } ], "metrics": [ { "cvssV3_0": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T01:06:04.636Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4693" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-40717", "datePublished": "2024-12-04T01:06:04.636Z", "dateReserved": "2024-07-09T01:04:07.427Z", "dateUpdated": "2025-03-13T17:40:27.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }