{"vulnerability": "CVE-2024-29855", "sightings": [{"uuid": "a1bb85ad-e98e-4fc1-b6d8-8c92cd3847ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29855", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7641", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855\nURL\uff1ahttps://github.com/sinsinology/CVE-2024-29855\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-13T11:27:22.000000Z"}, {"uuid": "1a978e53-f210-43c2-b70a-905d7f7d15b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29855", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3llfelmtywx2a", "content": "", "creation_timestamp": "2025-03-27T22:40:15.547903Z"}, {"uuid": "9f9e1070-987d-492f-9183-5c66baf2a40e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29855", "type": "published-proof-of-concept", "source": "https://t.me/darkcommunityofficial/990", "content": "#Veeam Recovery Orchestrator Authentication #CVE-2024-29855\n\nhttps://github.com/sinsinology/CVE-2024-29855", "creation_timestamp": "2024-06-14T19:25:31.000000Z"}, {"uuid": "c2501119-f3fd-47c3-bb17-2c9547726cb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29855", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9222", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-29855\n\ud83d\udd25 CVSS Score: 9 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Hard-coded JWT secret allows authentication bypass in Veeam Recovery Orchestrator\n\ud83d\udccf Published: 2024-06-11T03:55:54.458Z\n\ud83d\udccf Modified: 2025-03-27T21:09:44.177Z\n\ud83d\udd17 References:\n1. https://www.veeam.com/kb4585", "creation_timestamp": "2025-03-27T21:27:47.000000Z"}, {"uuid": "581c8fe9-f474-4afe-84d0-7f03858fe6c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29855", "type": "published-proof-of-concept", "source": "https://t.me/BleepingComputer/20150", "content": "\u200aExploit for Veeam Recovery Orchestrator auth bypass available, patch now\n\nA proof-of-concept (PoC) exploit for a critical Veeam Recovery Orchestrator authentication bypass vulnerability\u00a0tracked as CVE-2024-29855 has been released, elevating the risk of being exploited in attacks. [...]\n\nhttps://www.bleepingcomputer.com/news/security/exploit-for-veeam-recovery-orchestrator-auth-bypass-available-patch-now/", "creation_timestamp": "2024-06-13T20:05:50.000000Z"}, {"uuid": "a64ba7b8-abdf-49bf-bcaa-f3a6a52ade82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29855", "type": "published-proof-of-concept", "source": "https://t.me/true_sec/82", "content": "Veeam \u043a\u0440\u0430\u0441\u0430\u0432\u0446\u044b, \u043e\u0434\u0438\u043d jwt secret \u043d\u0430 \u0432\u0441\u0435\u0445. \u0418 \u044d\u0442\u043e \u043e\u043d\u0438 \u0437\u0430\u0431\u043e\u0442\u044f\u0442\u0441\u044f \u043e \u0441\u043e\u0445\u0440\u0430\u043d\u043d\u043e\u0441\u0442\u0438 \u043d\u0430\u0448\u0438\u0445 \u0434\u0430\u043d\u043d\u044b\u0445:)))\n\u0422\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u043e\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435: https://summoning.team/blog/veeam-recovery-Orchestrator-auth-bypass-CVE-2024-29855/", "creation_timestamp": "2024-06-14T05:53:53.000000Z"}, {"uuid": "4354c47d-4a34-49ce-8c06-6ceef52b4813", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29855", "type": "seen", "source": "https://t.me/HackingInsights/2167", "content": "\u200aVeeam Patches Critical Security Flaw in Recovery Orchestrator (CVE-2024-29855)\n\nhttps://securityonline.info/veeam-patches-critical-security-flaw-in-recovery-orchestrator-cve-2024-29855/", "creation_timestamp": "2024-06-11T13:54:52.000000Z"}, {"uuid": "831dbcb8-fa86-47e2-b828-40d8d78edc58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29855", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2661", "content": "https://github.com/sinsinology/CVE-2024-29855\n\nPoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855\n#github #poc", "creation_timestamp": "2024-06-14T09:26:13.000000Z"}, {"uuid": "c5e7f3c8-f8a1-42cd-9ced-faaafec64178", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29855", "type": "published-proof-of-concept", "source": "Telegram/LPSRAp8yVYCEC4Z95MJCg4PDgn6-UkYPCNkcIgXkGQNJI7I", "content": "", "creation_timestamp": "2024-08-06T23:48:46.000000Z"}, {"uuid": "8a7f8ef8-01cf-4865-a26c-be35dcda24a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29855", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/5856", "content": "\u041f\u043e\u0434 \u043a\u043e\u043d\u0435\u0446 \u043d\u0435\u0434\u0435\u043b\u0438 \u043f\u043e\u0434\u043e\u0441\u043f\u0435\u043b\u0438 PoC \u0434\u043b\u044f \u0440\u0430\u0437\u043d\u043e\u0433\u043e \u0440\u043e\u0434\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0438 \u0442\u0435, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043d\u0435\u043f\u0440\u0435\u043c\u0435\u043d\u043d\u043e \u0431\u0443\u0434\u0443\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u044b \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435.\n\n\u041e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u043e \u043a\u0438\u0431\u0435\u0440\u043f\u043e\u0434\u043f\u043e\u043b\u044c\u0435 \u0437\u0430\u0438\u043d\u0442\u0435\u0440\u0435\u0441\u0443\u0435\u0442 PoC \u0434\u043b\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0431\u0445\u043e\u0434\u0430 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 Veeam Recovery Orchestrator \u0432\u0435\u0440\u0441\u0438\u0439 7.0.0.337 \u0438 7.1.0.205 \u0438 \u0441\u0442\u0430\u0440\u0448\u0435,\u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u043e\u0439 \u043a\u0430\u043a CVE-2024-29855 \u0441 \u0440\u0435\u0439\u0442\u0438\u043d\u0433\u043e\u043c 9.0 \u043f\u043e CVSS v3.1.\n\n\u041e\u043d\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0431\u0435\u0437 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438, \u0432\u043e\u0439\u0442\u0438 \u0432 \u0432\u0435\u0431-\u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 VRO \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430.\u00a0\n\n\u042d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043b \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u00a0\u0421\u0438\u043d\u0430 \u0425\u0435\u0439\u0440\u043a\u0445\u0430\u0445, \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u0432 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u043f\u043e \u044d\u0442\u043e\u043c\u0443 \u043f\u043e\u0432\u043e\u0434\u0443 \u0443 \u0441\u0435\u0431\u044f \u043d\u0430 \u0441\u0430\u0439\u0442\u0435.\n\n\u0410 \u0432\u043e\u0442 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0430\u044f Qrator Labs \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442, \u0447\u0442\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0434\u0435\u043b\u044f\u0442\u0441\u044f \u043a\u043e\u0434\u043e\u043c PoC \u0434\u043b\u044f DDoS-\u0430\u0442\u0430\u043a\u0438 HTTP/2 Rapid Reset (CVE-2023-44487).\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c CertiK SkyFall \u0412\u0430\u043d \u0422\u0438\u043b\u0435\u0439 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b PoC \u0434\u043b\u044f CVE-2024-27801, \u043e\u0448\u0438\u0431\u043a\u0438 \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 NSXPC \u0432 macOS \u0438 iOS \u043e\u0442 Apple.\n\n\u041e\u043d\u0430 \u043e\u0448\u0438\u0431\u043a\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 \u0441 \u043c\u043e\u043c\u0435\u043d\u0442\u0430 \u0438\u0445 \u0432\u044b\u043f\u0443\u0441\u043a\u0430 \u0434\u0435\u0441\u044f\u0442\u044c \u043b\u0435\u0442 \u043d\u0430\u0437\u0430\u0434. Apple \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043c\u0430\u0435.\n\nHorizon3 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0430 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0438 PoC \u0434\u043b\u044f CVE-2024-29824, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f SQL \u0432 Ivanti EPM.\n\n\u041f\u043e\u043a\u0430 \u043d\u0438\u043a\u0430\u043a\u0438\u0445 \u043d\u0430\u043f\u0430\u0434\u0435\u043d\u0438\u0439\u00a0\u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435 \u043f\u043e\u043a\u0430 \u043d\u0435 \u043d\u0430\u0431\u043b\u044e\u0434\u0430\u043b\u043e\u0441\u044c, \u043d\u043e \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043e\u043a\u0430.\n\n\u0412\u044b\u0448\u043b\u043e \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0438 PoC \u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0431\u0445\u043e\u0434\u0430 \u043f\u0443\u0442\u0438 \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 (CVE-2024\u20134956) \u0432 Sonatype Nexus. \u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043c\u0430\u0435.", "creation_timestamp": "2024-06-14T14:23:44.000000Z"}, {"uuid": "525afa58-99fa-443f-a425-352a3170f5d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29855", "type": "published-proof-of-concept", "source": "Telegram/kfHfG80K89_8o1Wpcc6Oth122FuU92Kc-hWeYHq0oZt72rI", "content": "", "creation_timestamp": "2024-07-08T04:56:04.000000Z"}]}