Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTFR-2024-AVI-0740
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Veeam. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
Vendor | Product | Description | ||
---|---|---|---|---|
Veeam | Veeam Backup | Veeam Backup pour Oracle Linux Virtualization Manager et Red Hat Virtualization versions antérieures à 12.5.0.299 | ||
Veeam | Veeam Backup | Veeam Backup pour Nutanix AHV versions antérieures à 12.6.0.632 | ||
Veeam | Veeam ONE | Veeam ONE versions antérieures à 12.2.0.4093 | ||
Veeam | Veeam Backup & Replication | Veeam Backup & Replication versions antérieures à 12.2.0.334 | ||
Veeam | Veeam Service Provider Console | Veeam Service Provider Console versions antérieures à 8.1.0.21377 | ||
Veeam | Veeam Agent | Veeam Agent pour Linux versions antérieures à 6.2.0.101 |
References
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Veeam Backup pour Oracle Linux Virtualization Manager et Red Hat Virtualization versions ant\u00e9rieures \u00e0 12.5.0.299", "product": { "name": "Veeam Backup", "vendor": { "name": "Veeam", "scada": false } } }, { "description": "Veeam Backup pour Nutanix AHV versions ant\u00e9rieures \u00e0 12.6.0.632", "product": { "name": "Veeam Backup", "vendor": { "name": "Veeam", "scada": false } } }, { "description": "Veeam ONE versions ant\u00e9rieures \u00e0 12.2.0.4093", "product": { "name": "Veeam ONE", "vendor": { "name": "Veeam", "scada": false } } }, { "description": "Veeam Backup \u0026 Replication versions ant\u00e9rieures \u00e0 12.2.0.334", "product": { "name": "Veeam Backup \u0026 Replication", "vendor": { "name": "Veeam", "scada": false } } }, { "description": "Veeam Service Provider Console versions ant\u00e9rieures \u00e0 8.1.0.21377", "product": { "name": "Veeam Service Provider Console", "vendor": { "name": "Veeam", "scada": false } } }, { "description": "Veeam Agent pour Linux versions ant\u00e9rieures \u00e0 6.2.0.101", "product": { "name": "Veeam Agent", "vendor": { "name": "Veeam", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-39714", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39714" }, { "name": "CVE-2024-40718", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40718" }, { "name": "CVE-2024-42019", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42019" }, { "name": "CVE-2024-38650", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38650" }, { "name": "CVE-2024-38651", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38651" }, { "name": "CVE-2024-39718", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39718" }, { "name": "CVE-2024-40712", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40712" }, { "name": "CVE-2024-42023", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42023" }, { "name": "CVE-2024-40710", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40710" }, { "name": "CVE-2024-42022", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42022" }, { "name": "CVE-2024-42020", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42020" }, { "name": "CVE-2024-39715", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39715" }, { "name": "CVE-2024-40714", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40714" }, { "name": "CVE-2024-42021", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42021" }, { "name": "CVE-2024-40713", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40713" }, { "name": "CVE-2024-40709", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40709" }, { "name": "CVE-2024-42024", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42024" }, { "name": "CVE-2024-40711", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40711" } ], "initial_release_date": "2024-09-05T00:00:00", "last_revision_date": "2024-09-05T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0740", "revisions": [ { "description": "Version initiale", "revision_date": "2024-09-05T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Veeam. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Veeam", "vendor_advisories": [ { "published_at": "2024-09-04", "title": "Bulletin de s\u00e9curit\u00e9 Veeam kb4649", "url": "https://www.veeam.com/kb4649" } ] }
CVE-2024-40709 (GCVE-0-2024-40709)
Vulnerability from cvelistv5
Published
2024-09-07 16:11
Modified
2024-12-04 15:01
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A missing authorization vulnerability allows a local low-privileged user on the machine to escalate their privileges to root level.
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup and Recovery |
Version: 12.1.2 ≤ 12.1.2 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:agent:*:*:*:*:*:linux:*:*" ], "defaultStatus": "unaffected", "product": "agent", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "6.1.2.1781", "status": "affected", "version": "6", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-40709", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-09T15:05:48.581860Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T15:01:02.058Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup and Recovery", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.1.2", "status": "affected", "version": "12.1.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A missing authorization vulnerability allows a local low-privileged user on the machine to escalate their privileges to root level." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-09-07T16:11:22.216Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4649" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-40709", "datePublished": "2024-09-07T16:11:22.216Z", "dateReserved": "2024-07-09T01:04:07.424Z", "dateUpdated": "2024-12-04T15:01:02.058Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42020 (GCVE-0-2024-42020)
Vulnerability from cvelistv5
Published
2024-09-07 16:11
Modified
2024-10-27 14:31
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A Cross-site-scripting (XSS) vulnerability exists in the Reporter Widgets that allows HTML injection.
References
URL | Tags | |
---|---|---|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42020", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-09T16:21:31.971973Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-27T14:31:53.241Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "One", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.1", "status": "affected", "version": "12.1", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A Cross-site-scripting (XSS) vulnerability exists in the Reporter Widgets that allows HTML injection." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-09-07T16:11:22.194Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4649" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-42020", "datePublished": "2024-09-07T16:11:22.194Z", "dateReserved": "2024-07-27T01:04:08.012Z", "dateUpdated": "2024-10-27T14:31:53.241Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39715 (GCVE-0-2024-39715)
Vulnerability from cvelistv5
Published
2024-09-07 16:11
Modified
2024-09-09 15:15
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A code injection vulnerability that allows a low-privileged user with REST API access granted to remotely upload arbitrary files to the VSPC server using REST API, leading to remote code execution on VSPC server.
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Veeam Service Provider Console |
Version: 8 ≤ 8 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:service_provider_console:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "service_provider_console", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "8.0.0.19552", "status": "affected", "version": "8", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-39715", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-09T15:13:24.936483Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-09T15:15:08.789Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Veeam Service Provider Console", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "8", "status": "affected", "version": "8", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A code injection vulnerability that allows a low-privileged user with REST API access granted to remotely upload arbitrary files to the VSPC server using REST API, leading to remote code execution on VSPC server." } ], "metrics": [ { "cvssV3_0": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-09-07T16:11:22.204Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4649" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-39715", "datePublished": "2024-09-07T16:11:22.204Z", "dateReserved": "2024-06-28T01:04:08.821Z", "dateUpdated": "2024-09-09T15:15:08.789Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39714 (GCVE-0-2024-39714)
Vulnerability from cvelistv5
Published
2024-09-07 16:11
Modified
2024-09-09 16:23
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A code injection vulnerability that permits a low-privileged user to upload arbitrary files to the server, leading to remote code execution on VSPC server.
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Veeam Service Provider Console |
Version: 8 ≤ 8 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:service_provider_console:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "service_provider_console", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "8.0.0.19552", "status": "affected", "version": "8", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-39714", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-09T16:22:17.899275Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-09T16:23:20.600Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Veeam Service Provider Console", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "8", "status": "affected", "version": "8", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A code injection vulnerability that permits a low-privileged user to upload arbitrary files to the server, leading to remote code execution on VSPC server." } ], "metrics": [ { "cvssV3_0": { "baseScore": 9.9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-09-07T16:11:22.188Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4649" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-39714", "datePublished": "2024-09-07T16:11:22.188Z", "dateReserved": "2024-06-28T01:04:08.821Z", "dateUpdated": "2024-09-09T16:23:20.600Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-38651 (GCVE-0-2024-38651)
Vulnerability from cvelistv5
Published
2024-09-07 16:11
Modified
2024-09-09 16:20
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A code injection vulnerability can allow a low-privileged user to overwrite files on that VSPC server, which can lead to remote code execution on VSPC server.
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Veeam Service Provider Console |
Version: 8 ≤ 8 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:service_provider_console:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "service_provider_console", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "8.0.0.19552", "status": "affected", "version": "8", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-38651", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-09T16:19:56.829824Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-09T16:20:59.132Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Veeam Service Provider Console", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "8", "status": "affected", "version": "8", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A code injection vulnerability can allow a low-privileged user to overwrite files on that VSPC server, which can lead to remote code execution on VSPC server." } ], "metrics": [ { "cvssV3_0": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-09-07T16:11:22.198Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4649" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-38651", "datePublished": "2024-09-07T16:11:22.198Z", "dateReserved": "2024-06-19T01:04:07.137Z", "dateUpdated": "2024-09-09T16:20:59.132Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-38650 (GCVE-0-2024-38650)
Vulnerability from cvelistv5
Published
2024-09-07 16:11
Modified
2024-09-09 13:29
Severity ?
VLAI Severity ?
EPSS score ?
Summary
An authentication bypass vulnerability can allow a low privileged attacker to access the NTLM hash of service account on the VSPC server.
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Veeam Service Provider Console |
Version: 8 ≤ 8 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:service_provider_console:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "service_provider_console", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "8.0.0.19552", "status": "affected", "version": "8", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-38650", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-09T13:14:42.800022Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-09T13:29:12.838Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Veeam Service Provider Console", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "8", "status": "affected", "version": "8", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An authentication bypass vulnerability can allow a low privileged attacker to access the NTLM hash of service account on the VSPC server." } ], "metrics": [ { "cvssV3_0": { "baseScore": 9.9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-09-07T16:11:22.353Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4649" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-38650", "datePublished": "2024-09-07T16:11:22.353Z", "dateReserved": "2024-06-19T01:04:07.137Z", "dateUpdated": "2024-09-09T13:29:12.838Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-40712 (GCVE-0-2024-40712)
Vulnerability from cvelistv5
Published
2024-09-07 16:11
Modified
2024-09-09 15:18
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A path traversal vulnerability allows an attacker with a low-privileged account and local access to the system to perform local privilege escalation (LPE).
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup and Recovery |
Version: 12.1.2 ≤ 12.1.2 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:backup_\\\u0026_replication:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "backup_\\\u0026_replication", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "12.1.2.172", "status": "affected", "version": "12", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-40712", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-09T15:17:19.696138Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-09T15:18:23.506Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup and Recovery", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.1.2", "status": "affected", "version": "12.1.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A path traversal vulnerability allows an attacker with a low-privileged account and local access to the system to perform local privilege escalation (LPE)." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-09-07T16:11:22.203Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4649" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-40712", "datePublished": "2024-09-07T16:11:22.203Z", "dateReserved": "2024-07-09T01:04:07.425Z", "dateUpdated": "2024-09-09T15:18:23.506Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39718 (GCVE-0-2024-39718)
Vulnerability from cvelistv5
Published
2024-09-07 16:11
Modified
2024-11-01 19:18
Severity ?
VLAI Severity ?
EPSS score ?
Summary
An improper input validation vulnerability that allows a low-privileged user to remotely remove files on the system with permissions equivalent to those of the service account.
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup and Recovery |
Version: 12.1.2 ≤ 12.1.2 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39718", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-09T16:28:49.290660Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-01T19:18:00.417Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup and Recovery", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.1.2", "status": "affected", "version": "12.1.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper input validation vulnerability that allows a low-privileged user to remotely remove files on the system with permissions equivalent to those of the service account." } ], "metrics": [ { "cvssV3_0": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-09-07T16:11:22.180Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4649" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-39718", "datePublished": "2024-09-07T16:11:22.180Z", "dateReserved": "2024-06-28T01:04:08.821Z", "dateUpdated": "2024-11-01T19:18:00.417Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-40710 (GCVE-0-2024-40710)
Vulnerability from cvelistv5
Published
2024-09-07 16:11
Modified
2024-09-09 16:28
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A series of related high-severity vulnerabilities, the most notable enabling remote code execution (RCE) as the service account and extraction of sensitive information (savedcredentials and passwords). Exploiting these vulnerabilities requires a user who has been assigned a low-privileged role within Veeam Backup & Replication.
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup and Recovery |
Version: 12.1.2 ≤ 12.1.2 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:backup_\\\u0026_replication:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "backup_\\\u0026_replication", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "12.1.2.172", "status": "affected", "version": "12", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-40710", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-09T16:24:07.727007Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-522", "description": "CWE-522 Insufficiently Protected Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-09T16:28:11.865Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup and Recovery", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.1.2", "status": "affected", "version": "12.1.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A series of related high-severity vulnerabilities, the most notable enabling remote code execution (RCE) as the service account and extraction of sensitive information (savedcredentials and passwords). Exploiting these vulnerabilities requires a user who has been assigned a low-privileged role within Veeam Backup \u0026 Replication." } ], "metrics": [ { "cvssV3_0": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-09-07T16:11:22.182Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4649" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-40710", "datePublished": "2024-09-07T16:11:22.182Z", "dateReserved": "2024-07-09T01:04:07.424Z", "dateUpdated": "2024-09-09T16:28:11.865Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42019 (GCVE-0-2024-42019)
Vulnerability from cvelistv5
Published
2024-09-07 16:11
Modified
2024-09-09 16:41
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability that allows an attacker to access the NTLM hash of the Veeam Reporter Service service account. This attack requires user interaction and data collected from Veeam Backup & Replication.
References
URL | Tags | |
---|---|---|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:one:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "one", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "12.1.0.3208", "status": "affected", "version": "12", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42019", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-09T16:29:35.089567Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-09T16:41:08.546Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "One", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.1", "status": "affected", "version": "12.1", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability that allows an attacker to access the NTLM hash of the Veeam Reporter Service service account. This attack requires user interaction and data collected from Veeam Backup \u0026 Replication." } ], "metrics": [ { "cvssV3_0": { "baseScore": 9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-09-07T16:11:22.117Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4649" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-42019", "datePublished": "2024-09-07T16:11:22.117Z", "dateReserved": "2024-07-27T01:04:08.012Z", "dateUpdated": "2024-09-09T16:41:08.546Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42021 (GCVE-0-2024-42021)
Vulnerability from cvelistv5
Published
2024-09-07 16:11
Modified
2024-09-09 13:33
Severity ?
VLAI Severity ?
EPSS score ?
Summary
An improper access control vulnerability allows an attacker with valid access tokens to access saved credentials.
References
URL | Tags | |
---|---|---|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:one:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "one", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "12.1.0.3208", "status": "affected", "version": "12", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42021", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-09T13:29:55.223222Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-09T13:33:58.971Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "One", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.1", "status": "affected", "version": "12.1", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability allows an attacker with valid access tokens to access saved credentials." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-09-07T16:11:22.333Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4649" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-42021", "datePublished": "2024-09-07T16:11:22.333Z", "dateReserved": "2024-07-27T01:04:08.013Z", "dateUpdated": "2024-09-09T13:33:58.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42022 (GCVE-0-2024-42022)
Vulnerability from cvelistv5
Published
2024-09-07 16:11
Modified
2024-09-09 14:15
Severity ?
VLAI Severity ?
EPSS score ?
Summary
An incorrect permission assignment vulnerability allows an attacker to modify product configuration files.
References
URL | Tags | |
---|---|---|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:one:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "one", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "12.1.0.3208", "status": "affected", "version": "12", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42022", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-09T14:12:31.245292Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-09T14:15:21.746Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "One", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.1", "status": "affected", "version": "12.1", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An incorrect permission assignment vulnerability allows an attacker to modify product configuration files." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-09-07T16:11:22.220Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4649" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-42022", "datePublished": "2024-09-07T16:11:22.220Z", "dateReserved": "2024-07-27T01:04:08.013Z", "dateUpdated": "2024-09-09T14:15:21.746Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-40714 (GCVE-0-2024-40714)
Vulnerability from cvelistv5
Published
2024-09-07 16:11
Modified
2024-09-09 14:03
Severity ?
VLAI Severity ?
EPSS score ?
Summary
An improper certificate validation vulnerability in TLS certificate validation allows an attacker on the same network to intercept sensitive credentials during restore operations.
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup and Recovery |
Version: 12.1.2 ≤ 12.1.2 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:backup_\\\u0026_replication:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "backup_\\\u0026_replication", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "12.1.2.172", "status": "affected", "version": "12", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-40714", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-09T14:00:23.609127Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-09T14:03:17.836Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup and Recovery", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.1.2", "status": "affected", "version": "12.1.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper certificate validation vulnerability in TLS certificate validation allows an attacker on the same network to intercept sensitive credentials during restore operations." } ], "metrics": [ { "cvssV3_0": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-09-07T16:11:22.237Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4649" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-40714", "datePublished": "2024-09-07T16:11:22.237Z", "dateReserved": "2024-07-09T01:04:07.426Z", "dateUpdated": "2024-09-09T14:03:17.836Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42023 (GCVE-0-2024-42023)
Vulnerability from cvelistv5
Published
2024-09-07 16:11
Modified
2024-09-09 13:36
Severity ?
VLAI Severity ?
EPSS score ?
Summary
An improper access control vulnerability allows low-privileged users to execute code with Administrator privileges remotely.
References
URL | Tags | |
---|---|---|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:one:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "one", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "12.1.0.3208", "status": "affected", "version": "12", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42023", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-09T13:34:38.918499Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-09T13:36:19.461Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "One", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.1", "status": "affected", "version": "12.1", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability allows low-privileged users to execute code with Administrator privileges remotely." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-09-07T16:11:22.238Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4649" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-42023", "datePublished": "2024-09-07T16:11:22.238Z", "dateReserved": "2024-07-27T01:04:08.013Z", "dateUpdated": "2024-09-09T13:36:19.461Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-40711 (GCVE-0-2024-40711)
Vulnerability from cvelistv5
Published
2024-09-07 16:11
Modified
2025-07-30 01:36
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A deserialization of untrusted data vulnerability with a malicious payload can allow an unauthenticated remote code execution (RCE).
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup and Recovery |
Version: 12.1.2 ≤ 12.1.2 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:backup_\\\u0026_replication:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "backup_\\\u0026_replication", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "12.2.0.334", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-40711", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-29T21:45:53.497382Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2024-10-17", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-40711" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:36:33.808Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "url": "https://labs.watchtowr.com/veeam-backup-response-rce-with-auth-but-mostly-without-auth-cve-2024-40711-2/" } ], "timeline": [ { "lang": "en", "time": "2024-10-17T00:00:00+00:00", "value": "CVE-2024-40711 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup and Recovery", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.1.2", "status": "affected", "version": "12.1.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A deserialization of untrusted data vulnerability with a malicious payload can allow an unauthenticated remote code execution (RCE)." } ], "metrics": [ { "cvssV3_0": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-09-07T16:11:22.213Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4649" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-40711", "datePublished": "2024-09-07T16:11:22.213Z", "dateReserved": "2024-07-09T01:04:07.425Z", "dateUpdated": "2025-07-30T01:36:33.808Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42024 (GCVE-0-2024-42024)
Vulnerability from cvelistv5
Published
2024-09-07 16:11
Modified
2024-09-09 14:11
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability that allows an attacker in possession of the Veeam ONE Agent service account credentials to perform remote code execution on the machine where the Veeam ONE Agent is installed.
References
URL | Tags | |
---|---|---|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:one:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "one", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "12.1.0.3208", "status": "affected", "version": "12", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42024", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-09T14:04:05.003945Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-250", "description": "CWE-250 Execution with Unnecessary Privileges", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-09T14:11:39.524Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "One", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.1", "status": "affected", "version": "12.1", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability that allows an attacker in possession of the Veeam ONE Agent service account credentials to perform remote code execution on the machine where the Veeam ONE Agent is installed." } ], "metrics": [ { "cvssV3_0": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-09-07T16:11:22.220Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4649" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-42024", "datePublished": "2024-09-07T16:11:22.220Z", "dateReserved": "2024-07-27T01:04:08.013Z", "dateUpdated": "2024-09-09T14:11:39.524Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-40713 (GCVE-0-2024-40713)
Vulnerability from cvelistv5
Published
2024-09-07 16:11
Modified
2024-09-09 14:22
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability that allows a user who has been assigned a low-privileged role within Veeam Backup & Replication to alter Multi-Factor Authentication (MFA) settings and bypass MFA.
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup and Recovery |
Version: 12.1.2 ≤ 12.1.2 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:backup_\\\u0026_replication:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "backup_\\\u0026_replication", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "12.1.2.172", "status": "affected", "version": "12", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-40713", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-09T14:20:54.568516Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-09T14:22:01.961Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup and Recovery", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.1.2", "status": "affected", "version": "12.1.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability that allows a user who has been assigned a low-privileged role within Veeam Backup \u0026 Replication to alter Multi-Factor Authentication (MFA) settings and bypass MFA." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-09-07T16:11:22.216Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4649" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-40713", "datePublished": "2024-09-07T16:11:22.216Z", "dateReserved": "2024-07-09T01:04:07.426Z", "dateUpdated": "2024-09-09T14:22:01.961Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-40718 (GCVE-0-2024-40718)
Vulnerability from cvelistv5
Published
2024-09-07 16:11
Modified
2024-09-09 13:59
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A server side request forgery vulnerability allows a low-privileged user to perform local privilege escalation through exploiting an SSRF vulnerability.
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Veeam | Nutanix AHV |
Version: 12.6.0 ≤ |
|||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:backup_for_nutanix_ahv:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "backup_for_nutanix_ahv", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "12.5.1.8", "status": "affected", "version": "12", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:veeam:backup_for_oracle_linux_virtualization_manager_and_red_hat_virtualization:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "backup_for_oracle_linux_virtualization_manager_and_red_hat_virtualization", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "12.4.1.45", "status": "affected", "version": "12", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-40718", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-09T13:39:16.733257Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918 Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-09T13:59:32.964Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Nutanix AHV", "vendor": "Veeam", "versions": [ { "lessThan": "12.6.0", "status": "affected", "version": "12.6.0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Nutanix KVM", "vendor": "Veeam", "versions": [ { "lessThan": "12.5.0", "status": "affected", "version": "12.5.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A server side request forgery vulnerability allows a low-privileged user to perform local privilege escalation through exploiting an SSRF vulnerability." } ], "metrics": [ { "cvssV3_0": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-09-07T16:11:22.238Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4649" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-40718", "datePublished": "2024-09-07T16:11:22.238Z", "dateReserved": "2024-07-09T01:04:07.427Z", "dateUpdated": "2024-09-09T13:59:32.964Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…