Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTFR-2024-AVI-1039
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Veeam. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
Vendor | Product | Description | ||
---|---|---|---|---|
Veeam | Veeam Service Provider Console | Veeam Service Provider Console versions antérieures à 8.1.0.21999 | ||
Veeam | Veeam Agent | Veeam Agent pour Microsoft Windows versions antérieures à 6.3.0.177 | ||
Veeam | Veeam Backup & Replication | Veeam Backup & Replication versions antérieures à 12.3.0.310 |
References
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Veeam Service Provider Console versions ant\u00e9rieures \u00e0 8.1.0.21999", "product": { "name": "Veeam Service Provider Console", "vendor": { "name": "Veeam", "scada": false } } }, { "description": "Veeam Agent pour Microsoft Windows versions ant\u00e9rieures \u00e0 6.3.0.177", "product": { "name": "Veeam Agent", "vendor": { "name": "Veeam", "scada": false } } }, { "description": "Veeam Backup \u0026 Replication versions ant\u00e9rieures \u00e0 12.3.0.310", "product": { "name": "Veeam Backup \u0026 Replication", "vendor": { "name": "Veeam", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-40717", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40717" }, { "name": "CVE-2024-42453", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42453" }, { "name": "CVE-2024-42456", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42456" }, { "name": "CVE-2024-45204", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45204" }, { "name": "CVE-2024-42457", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42457" }, { "name": "CVE-2024-42449", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42449" }, { "name": "CVE-2024-42452", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42452" }, { "name": "CVE-2024-42451", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42451" }, { "name": "CVE-2024-45207", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45207" }, { "name": "CVE-2024-42455", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42455" }, { "name": "CVE-2024-42448", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42448" } ], "initial_release_date": "2024-12-04T00:00:00", "last_revision_date": "2024-12-04T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-1039", "revisions": [ { "description": "Version initiale", "revision_date": "2024-12-04T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Veeam. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Veeam", "vendor_advisories": [ { "published_at": "2024-12-03", "title": "Bulletin de s\u00e9curit\u00e9 Veeam kb4693", "url": "https://www.veeam.com/kb4693" }, { "published_at": "2024-12-03", "title": "Bulletin de s\u00e9curit\u00e9 Veeam kb4679", "url": "https://www.veeam.com/kb4679" } ] }
CVE-2024-42449 (GCVE-0-2024-42449)
Vulnerability from cvelistv5
Published
2024-12-04 01:06
Modified
2025-03-13 14:54
Severity ?
VLAI Severity ?
EPSS score ?
Summary
From the VSPC management agent machine, under condition that the management agent is authorized on the server, it is possible to remove arbitrary files on the VSPC server machine.
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Service Provider Console |
Version: 8.1 ≤ 8.1 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:service_provider_console:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "service_provider_console", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "8.1.0.21377", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42449", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-05T04:55:08.781974Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732 Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-13T14:54:19.282Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Service Provider Console", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "8.1", "status": "affected", "version": "8.1", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "From the VSPC management agent machine, under condition that the management agent is authorized on the server, it is possible to remove arbitrary files on the VSPC server machine." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T01:06:04.625Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4679" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-42449", "datePublished": "2024-12-04T01:06:04.625Z", "dateReserved": "2024-08-02T01:04:07.984Z", "dateUpdated": "2025-03-13T14:54:19.282Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42456 (GCVE-0-2024-42456)
Vulnerability from cvelistv5
Published
2024-12-04 01:06
Modified
2024-12-04 16:48
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability in Veeam Backup & Replication platform allows a low-privileged user with a specific role to exploit a method that updates critical configuration settings, such as modifying the trusted client certificate used for authentication on a specific port. This can result in unauthorized access, enabling the user to call privileged methods and initiate critical services. The issue arises due to insufficient permission requirements on the method, allowing users with low privileges to perform actions that should require higher-level permissions.
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup & Replication |
Version: 12.2 ≤ 12.2 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:backup_and_replication:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "backup_and_replication", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "12.2.0.334", "status": "affected", "version": "12.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42456", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T16:48:18.329521Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T16:48:57.686Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup \u0026 Replication", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.2", "status": "affected", "version": "12.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Veeam Backup \u0026 Replication platform allows a low-privileged user with a specific role to exploit a method that updates critical configuration settings, such as modifying the trusted client certificate used for authentication on a specific port. This can result in unauthorized access, enabling the user to call privileged methods and initiate critical services. The issue arises due to insufficient permission requirements on the method, allowing users with low privileges to perform actions that should require higher-level permissions." } ], "metrics": [ { "cvssV3_0": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T01:06:04.627Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4693" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-42456", "datePublished": "2024-12-04T01:06:04.627Z", "dateReserved": "2024-08-02T01:04:07.985Z", "dateUpdated": "2024-12-04T16:48:57.686Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42451 (GCVE-0-2024-42451)
Vulnerability from cvelistv5
Published
2024-12-04 01:06
Modified
2024-12-04 14:53
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability in Veeam Backup & Replication allows low-privileged users to leak all saved credentials in plaintext. This is achieved by calling a series of methods over an external protocol, ultimately retrieving the credentials using a malicious setup on the attacker's side. This exposes sensitive data, which could be used for further attacks, including unauthorized access to systems managed by the platform.
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup & Replication |
Version: 12.2 ≤ 12.2 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42451", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T14:53:37.311607Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-312", "description": "CWE-312 Cleartext Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T14:53:46.665Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup \u0026 Replication", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.2", "status": "affected", "version": "12.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Veeam Backup \u0026 Replication allows low-privileged users to leak all saved credentials in plaintext. This is achieved by calling a series of methods over an external protocol, ultimately retrieving the credentials using a malicious setup on the attacker\u0027s side. This exposes sensitive data, which could be used for further attacks, including unauthorized access to systems managed by the platform." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T01:06:04.677Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4693" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-42451", "datePublished": "2024-12-04T01:06:04.677Z", "dateReserved": "2024-08-02T01:04:07.984Z", "dateUpdated": "2024-12-04T14:53:46.665Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42452 (GCVE-0-2024-42452)
Vulnerability from cvelistv5
Published
2024-12-04 01:06
Modified
2024-12-04 16:03
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability in Veeam Backup & Replication allows a low-privileged user to start an agent remotely in server mode and obtain credentials, effectively escalating privileges to system-level access. This allows the attacker to upload files to the server with elevated privileges. The vulnerability exists because remote calls bypass permission checks, leading to full system compromise.
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup & Replication |
Version: 12.2 ≤ 12.2 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:agent:*:*:*:*:*:windows:*:*" ], "defaultStatus": "unknown", "product": "agent", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "12.2.0.334", "status": "affected", "version": "12.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42452", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T16:01:00.432136Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T16:03:26.578Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup \u0026 Replication", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.2", "status": "affected", "version": "12.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Veeam Backup \u0026 Replication allows a low-privileged user to start an agent remotely in server mode and obtain credentials, effectively escalating privileges to system-level access. This allows the attacker to upload files to the server with elevated privileges. The vulnerability exists because remote calls bypass permission checks, leading to full system compromise." } ], "metrics": [ { "cvssV3_0": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T01:06:04.654Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4693" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-42452", "datePublished": "2024-12-04T01:06:04.654Z", "dateReserved": "2024-08-02T01:04:07.984Z", "dateUpdated": "2024-12-04T16:03:26.578Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-45207 (GCVE-0-2024-45207)
Vulnerability from cvelistv5
Published
2024-12-04 01:06
Modified
2024-12-04 15:21
Severity ?
VLAI Severity ?
EPSS score ?
Summary
DLL injection in Veeam Agent for Windows can occur if the system's PATH variable includes insecure locations. When the agent runs, it searches these directories for necessary DLLs. If an attacker places a malicious DLL in one of these directories, the Veeam Agent might load it inadvertently, allowing the attacker to execute harmful code. This could lead to unauthorized access, data theft, or disruption of services
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Agent for Windows |
Version: 12.2 ≤ 12.2 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:agent:*:*:*:*:*:windows:*:*" ], "defaultStatus": "unknown", "product": "agent", "vendor": "veeam", "versions": [ { "lessThan": "6.3.0.177", "status": "affected", "version": "6.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45207", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T14:55:19.211011Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-426", "description": "CWE-426 Untrusted Search Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T15:21:30.380Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Agent for Windows", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.2", "status": "affected", "version": "12.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "DLL injection in Veeam Agent for Windows can occur if the system\u0027s PATH variable includes insecure locations. When the agent runs, it searches these directories for necessary DLLs. If an attacker places a malicious DLL in one of these directories, the Veeam Agent might load it inadvertently, allowing the attacker to execute harmful code. This could lead to unauthorized access, data theft, or disruption of services" } ], "metrics": [ { "cvssV3_0": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T01:06:04.660Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4693" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-45207", "datePublished": "2024-12-04T01:06:04.660Z", "dateReserved": "2024-08-23T01:00:01.061Z", "dateUpdated": "2024-12-04T15:21:30.380Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42448 (GCVE-0-2024-42448)
Vulnerability from cvelistv5
Published
2024-12-11 18:52
Modified
2024-12-12 14:42
Severity ?
VLAI Severity ?
EPSS score ?
Summary
From the VSPC management agent machine, under condition that the management agent is authorized on the server, it is possible to perform Remote Code Execution (RCE) on the VSPC server machine.
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Service Provider Console |
Version: 8.1 ≤ 8.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42448", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T14:40:33.303223Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T14:42:44.457Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Service Provider Console", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "8.1", "status": "affected", "version": "8.1", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "From the VSPC management agent machine, under condition that the management agent is authorized on the server, it is possible to perform Remote Code Execution (RCE) on the VSPC server machine." } ], "metrics": [ { "cvssV3_0": { "baseScore": 9.9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-12-11T18:52:27.501Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4679" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-42448", "datePublished": "2024-12-11T18:52:27.501Z", "dateReserved": "2024-08-02T01:04:07.984Z", "dateUpdated": "2024-12-12T14:42:44.457Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42457 (GCVE-0-2024-42457)
Vulnerability from cvelistv5
Published
2024-12-04 01:06
Modified
2024-12-04 16:00
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability in Veeam Backup & Replication allows users with certain operator roles to expose saved credentials by leveraging a combination of methods in a remote management interface. This can be achieved using a session object that allows for credential enumeration and exploitation, leading to the leak of plaintext credentials to a malicious host. The attack is facilitated by improper usage of a method that allows operators to add a new host with an attacker-controlled IP, enabling them to retrieve sensitive credentials in plaintext.
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup & Replication |
Version: 12.2 ≤ 12.2 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42457", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T15:47:05.862624Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-522", "description": "CWE-522 Insufficiently Protected Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T16:00:32.213Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup \u0026 Replication", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.2", "status": "affected", "version": "12.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Veeam Backup \u0026 Replication allows users with certain operator roles to expose saved credentials by leveraging a combination of methods in a remote management interface. This can be achieved using a session object that allows for credential enumeration and exploitation, leading to the leak of plaintext credentials to a malicious host. The attack is facilitated by improper usage of a method that allows operators to add a new host with an attacker-controlled IP, enabling them to retrieve sensitive credentials in plaintext." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T01:06:04.658Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4693" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-42457", "datePublished": "2024-12-04T01:06:04.658Z", "dateReserved": "2024-08-02T01:04:07.985Z", "dateUpdated": "2024-12-04T16:00:32.213Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42455 (GCVE-0-2024-42455)
Vulnerability from cvelistv5
Published
2024-12-04 01:06
Modified
2024-12-05 10:59
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability in Veeam Backup & Replication allows a low-privileged user to connect to remoting services and exploit insecure deserialization by sending a serialized temporary file collection. This exploit allows the attacker to delete any file on the system with service account privileges. The vulnerability is caused by an insufficient blacklist during the deserialization process.
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup & Replication |
Version: 12.2 ≤ 12.2 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:backup_and_replication:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "backup_and_replication", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "12.2.0.334", "status": "affected", "version": "12.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42455", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-05T10:59:26.045567Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-05T10:59:46.913Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup \u0026 Replication", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.2", "status": "affected", "version": "12.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Veeam Backup \u0026 Replication allows a low-privileged user to connect to remoting services and exploit insecure deserialization by sending a serialized temporary file collection. This exploit allows the attacker to delete any file on the system with service account privileges. The vulnerability is caused by an insufficient blacklist during the deserialization process." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T01:06:04.626Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4693" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-42455", "datePublished": "2024-12-04T01:06:04.626Z", "dateReserved": "2024-08-02T01:04:07.985Z", "dateUpdated": "2024-12-05T10:59:46.913Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-45204 (GCVE-0-2024-45204)
Vulnerability from cvelistv5
Published
2024-12-04 01:06
Modified
2024-12-06 20:10
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability exists where a low-privileged user can exploit insufficient permissions in credential handling to leak NTLM hashes of saved credentials. The exploitation involves using retrieved credentials to expose sensitive NTLM hashes, impacting systems beyond the initial target and potentially leading to broader security vulnerabilities.
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup & Replication |
Version: 12.2 ≤ 12.2 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45204", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T14:46:20.732535Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-06T20:10:23.572Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup \u0026 Replication", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.2", "status": "affected", "version": "12.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability exists where a low-privileged user can exploit insufficient permissions in credential handling to leak NTLM hashes of saved credentials. The exploitation involves using retrieved credentials to expose sensitive NTLM hashes, impacting systems beyond the initial target and potentially leading to broader security vulnerabilities." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T01:06:05.328Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4693" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-45204", "datePublished": "2024-12-04T01:06:05.328Z", "dateReserved": "2024-08-23T01:00:01.060Z", "dateUpdated": "2024-12-06T20:10:23.572Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42453 (GCVE-0-2024-42453)
Vulnerability from cvelistv5
Published
2024-12-04 01:06
Modified
2024-12-04 14:54
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability Veeam Backup & Replication allows low-privileged users to control and modify configurations on connected virtual infrastructure hosts. This includes the ability to power off virtual machines, delete files in storage, and make configuration changes, potentially leading to Denial of Service (DoS) and data integrity issues. The vulnerability is caused by improper permission checks in methods accessed via management services.
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup & Replication |
Version: 12.2 ≤ 12.2 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42453", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T14:53:56.348517Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T14:54:37.763Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup \u0026 Replication", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.2", "status": "affected", "version": "12.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability Veeam Backup \u0026 Replication allows low-privileged users to control and modify configurations on connected virtual infrastructure hosts. This includes the ability to power off virtual machines, delete files in storage, and make configuration changes, potentially leading to Denial of Service (DoS) and data integrity issues. The vulnerability is caused by improper permission checks in methods accessed via management services." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T01:06:04.668Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4693" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-42453", "datePublished": "2024-12-04T01:06:04.668Z", "dateReserved": "2024-08-02T01:04:07.985Z", "dateUpdated": "2024-12-04T14:54:37.763Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-40717 (GCVE-0-2024-40717)
Vulnerability from cvelistv5
Published
2024-12-04 01:06
Modified
2025-03-13 17:40
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability in Veeam Backup & Replication allows a low-privileged user with certain roles to perform remote code execution (RCE) by updating existing jobs. These jobs can be configured to run pre- and post-scripts, which can be located on a network share and are executed with elevated privileges by default. The user can update a job and schedule it to run almost immediately, allowing arbitrary code execution on the server.
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup & Replication |
Version: 12.2 ≤ 12.2 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:veeam:backup_and_replication:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "backup_and_replication", "vendor": "veeam", "versions": [ { "lessThanOrEqual": "12.2.0.334", "status": "affected", "version": "12.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-40717", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T16:32:56.308114Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-13T17:40:27.483Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup \u0026 Replication", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.2", "status": "affected", "version": "12.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Veeam Backup \u0026 Replication allows a low-privileged user with certain roles to perform remote code execution (RCE) by updating existing jobs. These jobs can be configured to run pre- and post-scripts, which can be located on a network share and are executed with elevated privileges by default. The user can update a job and schedule it to run almost immediately, allowing arbitrary code execution on the server." } ], "metrics": [ { "cvssV3_0": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T01:06:04.636Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4693" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-40717", "datePublished": "2024-12-04T01:06:04.636Z", "dateReserved": "2024-07-09T01:04:07.427Z", "dateUpdated": "2025-03-13T17:40:27.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…