Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-45204 (GCVE-0-2024-45204)
Vulnerability from cvelistv5
URL | Tags | ||||||
---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Veeam | Backup & Replication |
Version: 12.2 ≤ 12.2 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45204", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T14:46:20.732535Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-06T20:10:23.572Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Backup \u0026 Replication", "vendor": "Veeam", "versions": [ { "lessThanOrEqual": "12.2", "status": "affected", "version": "12.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability exists where a low-privileged user can exploit insufficient permissions in credential handling to leak NTLM hashes of saved credentials. The exploitation involves using retrieved credentials to expose sensitive NTLM hashes, impacting systems beyond the initial target and potentially leading to broader security vulnerabilities." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T01:06:05.328Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://www.veeam.com/kb4693" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-45204", "datePublished": "2024-12-04T01:06:05.328Z", "dateReserved": "2024-08-23T01:00:01.060Z", "dateUpdated": "2024-12-06T20:10:23.572Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-45204\",\"sourceIdentifier\":\"support@hackerone.com\",\"published\":\"2024-12-04T02:15:05.233\",\"lastModified\":\"2025-04-24T16:59:33.837\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability exists where a low-privileged user can exploit insufficient permissions in credential handling to leak NTLM hashes of saved credentials. The exploitation involves using retrieved credentials to expose sensitive NTLM hashes, impacting systems beyond the initial target and potentially leading to broader security vulnerabilities.\"},{\"lang\":\"es\",\"value\":\" Existe una vulnerabilidad en la que un usuario con pocos privilegios puede aprovechar la falta de permisos en el manejo de credenciales para filtrar hashes NTLM de credenciales guardadas. La explotaci\u00f3n implica el uso de credenciales recuperadas para exponer hashes NTLM confidenciales, lo que afecta a sistemas m\u00e1s all\u00e1 del objetivo inicial y puede generar vulnerabilidades de seguridad m\u00e1s amplias.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4}],\"cvssMetricV30\":[{\"source\":\"support@hackerone.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\",\"baseScore\":7.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.1,\"impactScore\":4.0}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-863\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:veeam:veeam_backup_\\\\\u0026_replication:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.0.0.1402\",\"versionEndExcluding\":\"12.3.0.310\",\"matchCriteriaId\":\"97D6D507-5200-44A1-9122-C3CF8660C1C7\"}]}]}],\"references\":[{\"url\":\"https://www.veeam.com/kb4693\",\"source\":\"support@hackerone.com\",\"tags\":[\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-45204\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-04T14:46:20.732535Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-863\", \"description\": \"CWE-863 Incorrect Authorization\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-04T14:46:53.528Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 7.7, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\"}}], \"affected\": [{\"vendor\": \"Veeam\", \"product\": \"Backup \u0026 Replication\", \"versions\": [{\"status\": \"affected\", \"version\": \"12.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"12.2\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.veeam.com/kb4693\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability exists where a low-privileged user can exploit insufficient permissions in credential handling to leak NTLM hashes of saved credentials. The exploitation involves using retrieved credentials to expose sensitive NTLM hashes, impacting systems beyond the initial target and potentially leading to broader security vulnerabilities.\"}], \"providerMetadata\": {\"orgId\": \"36234546-b8fa-4601-9d6f-f4e334aa8ea1\", \"shortName\": \"hackerone\", \"dateUpdated\": \"2024-12-04T01:06:05.328Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-45204\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-06T20:10:23.572Z\", \"dateReserved\": \"2024-08-23T01:00:01.060Z\", \"assignerOrgId\": \"36234546-b8fa-4601-9d6f-f4e334aa8ea1\", \"datePublished\": \"2024-12-04T01:06:05.328Z\", \"assignerShortName\": \"hackerone\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
ncsc-2024-0463
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Veeam heeft kwetsbaarheden verholpen in Veeam Backup \u0026 Replication.", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden in Veeam Backup \u0026 Replication stellen laaggeprivilegieerde gebruikers in staat om op afstand code uit te voeren, opgeslagen referenties in platte tekst te extraheren, een agent in servermodus te starten, configuraties binnen de virtuele infrastructuur te manipuleren, en kritieke configuratie-instellingen te exploiteren. Dit kan leiden tot ongeautoriseerde toegang tot gevoelige systemen en gegevens, privilege-escalatie, en zelfs gegevensverlies. De ernst van deze kwetsbaarheden vereist een zorgvuldige beoordeling van gebruikersrechten en configuratiebeheerpraktijken door organisaties die deze software gebruiken.", "title": "Interpretaties" }, { "category": "description", "text": "Veeam heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Insufficiently Protected Credentials", "title": "CWE-522" }, { "category": "general", "text": "Cleartext Storage of Sensitive Information", "title": "CWE-312" }, { "category": "general", "text": "Missing Authentication for Critical Function", "title": "CWE-306" }, { "category": "general", "text": "CWE-275", "title": "CWE-275" }, { "category": "general", "text": "Missing Authorization", "title": "CWE-862" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "Incorrect Authorization", "title": "CWE-863" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - certbundde; cveprojectv5; nvd", "url": "https://www.veeam.com/kb4693" } ], "title": "Kwetsbaarheden verholpen in Veeam Backup \u0026 Replication", "tracking": { "current_release_date": "2024-12-06T11:47:19.699742Z", "id": "NCSC-2024-0463", "initial_release_date": "2024-12-06T11:47:19.699742Z", "revision_history": [ { "date": "2024-12-06T11:47:19.699742Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "agent", "product": { "name": "agent", "product_id": "CSAFPID-1736689", "product_identification_helper": { "cpe": "cpe:2.3:a:veeam:agent:*:*:*:*:*:windows:*:*" } } }, { "category": "product_name", "name": "backup___replication", "product": { "name": "backup___replication", "product_id": "CSAFPID-551489", "product_identification_helper": { "cpe": "cpe:2.3:a:veeam:backup___replication:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "backup_and_replication", "product": { "name": "backup_and_replication", "product_id": "CSAFPID-463593", "product_identification_helper": { "cpe": "cpe:2.3:a:veeam:backup_and_replication:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "veeam_backup_\\\u0026_replication", "product": { "name": "veeam_backup_\\\u0026_replication", "product_id": "CSAFPID-1710034", "product_identification_helper": { "cpe": "cpe:2.3:a:veeam:veeam_backup_\\\u0026_replication:12.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "veeam_backup_\\\u0026_replication", "product": { "name": "veeam_backup_\\\u0026_replication", "product_id": "CSAFPID-1710035", "product_identification_helper": { "cpe": "cpe:2.3:a:veeam:veeam_backup_\\\u0026_replication:12.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "veeam_backup_\\\u0026_replication", "product": { "name": "veeam_backup_\\\u0026_replication", "product_id": "CSAFPID-1710036", "product_identification_helper": { "cpe": "cpe:2.3:a:veeam:veeam_backup_\\\u0026_replication:12.2:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "veeam" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-40717", "product_status": { "known_affected": [ "CSAFPID-551489", "CSAFPID-463593" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40717", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40717.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-551489", "CSAFPID-463593" ] } ], "title": "CVE-2024-40717" }, { "cve": "CVE-2024-42451", "cwe": { "id": "CWE-312", "name": "Cleartext Storage of Sensitive Information" }, "notes": [ { "category": "other", "text": "Cleartext Storage of Sensitive Information", "title": "CWE-312" }, { "category": "other", "text": "Incorrect Authorization", "title": "CWE-863" } ], "product_status": { "known_affected": [ "CSAFPID-551489" ] }, "references": [ { "category": "self", "summary": "CVE-2024-42451", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42451.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-551489" ] } ], "title": "CVE-2024-42451" }, { "cve": "CVE-2024-42452", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "notes": [ { "category": "other", "text": "Incorrect Authorization", "title": "CWE-863" } ], "product_status": { "known_affected": [ "CSAFPID-551489", "CSAFPID-1736689" ] }, "references": [ { "category": "self", "summary": "CVE-2024-42452", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42452.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-551489", "CSAFPID-1736689" ] } ], "title": "CVE-2024-42452" }, { "cve": "CVE-2024-42453", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" }, { "category": "other", "text": "Missing Authorization", "title": "CWE-862" } ], "product_status": { "known_affected": [ "CSAFPID-551489" ] }, "references": [ { "category": "self", "summary": "CVE-2024-42453", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42453.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-551489" ] } ], "title": "CVE-2024-42453" }, { "cve": "CVE-2024-42455", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "other", "text": "Missing Authentication for Critical Function", "title": "CWE-306" } ], "product_status": { "known_affected": [ "CSAFPID-551489", "CSAFPID-463593" ] }, "references": [ { "category": "self", "summary": "CVE-2024-42455", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42455.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "CSAFPID-551489", "CSAFPID-463593" ] } ], "title": "CVE-2024-42455" }, { "cve": "CVE-2024-42456", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "other", "text": "Missing Authentication for Critical Function", "title": "CWE-306" } ], "product_status": { "known_affected": [ "CSAFPID-551489", "CSAFPID-463593" ] }, "references": [ { "category": "self", "summary": "CVE-2024-42456", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42456.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-551489", "CSAFPID-463593" ] } ], "title": "CVE-2024-42456" }, { "cve": "CVE-2024-42457", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "notes": [ { "category": "other", "text": "Insufficiently Protected Credentials", "title": "CWE-522" } ], "product_status": { "known_affected": [ "CSAFPID-551489" ] }, "references": [ { "category": "self", "summary": "CVE-2024-42457", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42457.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-551489" ] } ], "title": "CVE-2024-42457" }, { "cve": "CVE-2024-45204", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" } ], "product_status": { "known_affected": [ "CSAFPID-551489" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45204", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45204.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-551489" ] } ], "title": "CVE-2024-45204" } ] }
NCSC-2024-0463
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Veeam heeft kwetsbaarheden verholpen in Veeam Backup \u0026 Replication.", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden in Veeam Backup \u0026 Replication stellen laaggeprivilegieerde gebruikers in staat om op afstand code uit te voeren, opgeslagen referenties in platte tekst te extraheren, een agent in servermodus te starten, configuraties binnen de virtuele infrastructuur te manipuleren, en kritieke configuratie-instellingen te exploiteren. Dit kan leiden tot ongeautoriseerde toegang tot gevoelige systemen en gegevens, privilege-escalatie, en zelfs gegevensverlies. De ernst van deze kwetsbaarheden vereist een zorgvuldige beoordeling van gebruikersrechten en configuratiebeheerpraktijken door organisaties die deze software gebruiken.", "title": "Interpretaties" }, { "category": "description", "text": "Veeam heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Insufficiently Protected Credentials", "title": "CWE-522" }, { "category": "general", "text": "Cleartext Storage of Sensitive Information", "title": "CWE-312" }, { "category": "general", "text": "Missing Authentication for Critical Function", "title": "CWE-306" }, { "category": "general", "text": "CWE-275", "title": "CWE-275" }, { "category": "general", "text": "Missing Authorization", "title": "CWE-862" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "Incorrect Authorization", "title": "CWE-863" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - certbundde; cveprojectv5; nvd", "url": "https://www.veeam.com/kb4693" } ], "title": "Kwetsbaarheden verholpen in Veeam Backup \u0026 Replication", "tracking": { "current_release_date": "2024-12-06T11:47:19.699742Z", "id": "NCSC-2024-0463", "initial_release_date": "2024-12-06T11:47:19.699742Z", "revision_history": [ { "date": "2024-12-06T11:47:19.699742Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "agent", "product": { "name": "agent", "product_id": "CSAFPID-1736689", "product_identification_helper": { "cpe": "cpe:2.3:a:veeam:agent:*:*:*:*:*:windows:*:*" } } }, { "category": "product_name", "name": "backup___replication", "product": { "name": "backup___replication", "product_id": "CSAFPID-551489", "product_identification_helper": { "cpe": "cpe:2.3:a:veeam:backup___replication:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "backup_and_replication", "product": { "name": "backup_and_replication", "product_id": "CSAFPID-463593", "product_identification_helper": { "cpe": "cpe:2.3:a:veeam:backup_and_replication:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "veeam_backup_\\\u0026_replication", "product": { "name": "veeam_backup_\\\u0026_replication", "product_id": "CSAFPID-1710034", "product_identification_helper": { "cpe": "cpe:2.3:a:veeam:veeam_backup_\\\u0026_replication:12.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "veeam_backup_\\\u0026_replication", "product": { "name": "veeam_backup_\\\u0026_replication", "product_id": "CSAFPID-1710035", "product_identification_helper": { "cpe": "cpe:2.3:a:veeam:veeam_backup_\\\u0026_replication:12.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "veeam_backup_\\\u0026_replication", "product": { "name": "veeam_backup_\\\u0026_replication", "product_id": "CSAFPID-1710036", "product_identification_helper": { "cpe": "cpe:2.3:a:veeam:veeam_backup_\\\u0026_replication:12.2:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "veeam" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-40717", "product_status": { "known_affected": [ "CSAFPID-551489", "CSAFPID-463593" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40717", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40717.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-551489", "CSAFPID-463593" ] } ], "title": "CVE-2024-40717" }, { "cve": "CVE-2024-42451", "cwe": { "id": "CWE-312", "name": "Cleartext Storage of Sensitive Information" }, "notes": [ { "category": "other", "text": "Cleartext Storage of Sensitive Information", "title": "CWE-312" }, { "category": "other", "text": "Incorrect Authorization", "title": "CWE-863" } ], "product_status": { "known_affected": [ "CSAFPID-551489" ] }, "references": [ { "category": "self", "summary": "CVE-2024-42451", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42451.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-551489" ] } ], "title": "CVE-2024-42451" }, { "cve": "CVE-2024-42452", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "notes": [ { "category": "other", "text": "Incorrect Authorization", "title": "CWE-863" } ], "product_status": { "known_affected": [ "CSAFPID-551489", "CSAFPID-1736689" ] }, "references": [ { "category": "self", "summary": "CVE-2024-42452", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42452.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-551489", "CSAFPID-1736689" ] } ], "title": "CVE-2024-42452" }, { "cve": "CVE-2024-42453", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" }, { "category": "other", "text": "Missing Authorization", "title": "CWE-862" } ], "product_status": { "known_affected": [ "CSAFPID-551489" ] }, "references": [ { "category": "self", "summary": "CVE-2024-42453", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42453.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-551489" ] } ], "title": "CVE-2024-42453" }, { "cve": "CVE-2024-42455", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "other", "text": "Missing Authentication for Critical Function", "title": "CWE-306" } ], "product_status": { "known_affected": [ "CSAFPID-551489", "CSAFPID-463593" ] }, "references": [ { "category": "self", "summary": "CVE-2024-42455", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42455.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "CSAFPID-551489", "CSAFPID-463593" ] } ], "title": "CVE-2024-42455" }, { "cve": "CVE-2024-42456", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "other", "text": "Missing Authentication for Critical Function", "title": "CWE-306" } ], "product_status": { "known_affected": [ "CSAFPID-551489", "CSAFPID-463593" ] }, "references": [ { "category": "self", "summary": "CVE-2024-42456", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42456.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-551489", "CSAFPID-463593" ] } ], "title": "CVE-2024-42456" }, { "cve": "CVE-2024-42457", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "notes": [ { "category": "other", "text": "Insufficiently Protected Credentials", "title": "CWE-522" } ], "product_status": { "known_affected": [ "CSAFPID-551489" ] }, "references": [ { "category": "self", "summary": "CVE-2024-42457", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42457.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-551489" ] } ], "title": "CVE-2024-42457" }, { "cve": "CVE-2024-45204", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" } ], "product_status": { "known_affected": [ "CSAFPID-551489" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45204", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45204.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-551489" ] } ], "title": "CVE-2024-45204" } ] }
WID-SEC-W-2024-3602
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Veeam Backup \u0026 Replication ist eine Datensicherungsl\u00f6sung f\u00fcr VMware vSphere- und Microsoft Hyper-V-Umgebungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Veeam Backup \u0026 Replication ausnutzen, um seine Rechte zu erweitern, vertrauliche Informationen preiszugeben und Dateien zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3602 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3602.json" }, { "category": "self", "summary": "WID-SEC-2024-3602 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3602" }, { "category": "external", "summary": "Veeam Support Knowledge Base vom 2024-12-03", "url": "https://www.veeam.com/kb4693" } ], "source_lang": "en-US", "title": "Veeam Backup \u0026 Replication: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-12-03T23:00:00.000+00:00", "generator": { "date": "2024-12-04T11:46:04.114+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-3602", "initial_release_date": "2024-12-03T23:00:00.000+00:00", "revision_history": [ { "date": "2024-12-03T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c12.3", "product": { "name": "Veeam Backup \u0026 Replication \u003c12.3", "product_id": "T039554" } }, { "category": "product_version", "name": "12.3", "product": { "name": "Veeam Backup \u0026 Replication 12.3", "product_id": "T039554-fixed", "product_identification_helper": { "cpe": "cpe:/a:veeam:backup_and_replication:12.3" } } } ], "category": "product_name", "name": "Backup \u0026 Replication" } ], "category": "vendor", "name": "Veeam" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-40717", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Veeam Backup \u0026 Replication. Diese Fehler sind auf eine unzureichende Privilegienvalidierung, die fehlende Einschr\u00e4nkung von Privilegien f\u00fcr den Zugriff auf kritische Methoden und auf unzureichende Autorisierungspr\u00fcfungen zur\u00fcckzuf\u00fchren. Ein entfernter, authentisierter Angreifer mit einer zugewiesenen Rolle kann diese Schwachstellen ausnutzen, um erh\u00f6hte Privilegien zu erlangen. Mit erh\u00f6hten Rechten kann der Angreifer Skripte als LocalSystem ausf\u00fchren, Dateien auf angeschlossene ESXi-Hosts hochladen, die Konfiguration angeschlossener virtueller Infrastruktur-Hosts kontrollieren und \u00e4ndern sowie Zugriff auf privilegierte Methoden erhalten und kritische Dienste kontrollieren." } ], "product_status": { "known_affected": [ "T039554" ] }, "release_date": "2024-12-03T23:00:00.000+00:00", "title": "CVE-2024-40717" }, { "cve": "CVE-2024-42452", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Veeam Backup \u0026 Replication. Diese Fehler sind auf eine unzureichende Privilegienvalidierung, die fehlende Einschr\u00e4nkung von Privilegien f\u00fcr den Zugriff auf kritische Methoden und auf unzureichende Autorisierungspr\u00fcfungen zur\u00fcckzuf\u00fchren. Ein entfernter, authentisierter Angreifer mit einer zugewiesenen Rolle kann diese Schwachstellen ausnutzen, um erh\u00f6hte Privilegien zu erlangen. Mit erh\u00f6hten Rechten kann der Angreifer Skripte als LocalSystem ausf\u00fchren, Dateien auf angeschlossene ESXi-Hosts hochladen, die Konfiguration angeschlossener virtueller Infrastruktur-Hosts kontrollieren und \u00e4ndern sowie Zugriff auf privilegierte Methoden erhalten und kritische Dienste kontrollieren." } ], "product_status": { "known_affected": [ "T039554" ] }, "release_date": "2024-12-03T23:00:00.000+00:00", "title": "CVE-2024-42452" }, { "cve": "CVE-2024-42453", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Veeam Backup \u0026 Replication. Diese Fehler sind auf eine unzureichende Privilegienvalidierung, die fehlende Einschr\u00e4nkung von Privilegien f\u00fcr den Zugriff auf kritische Methoden und auf unzureichende Autorisierungspr\u00fcfungen zur\u00fcckzuf\u00fchren. Ein entfernter, authentisierter Angreifer mit einer zugewiesenen Rolle kann diese Schwachstellen ausnutzen, um erh\u00f6hte Privilegien zu erlangen. Mit erh\u00f6hten Rechten kann der Angreifer Skripte als LocalSystem ausf\u00fchren, Dateien auf angeschlossene ESXi-Hosts hochladen, die Konfiguration angeschlossener virtueller Infrastruktur-Hosts kontrollieren und \u00e4ndern sowie Zugriff auf privilegierte Methoden erhalten und kritische Dienste kontrollieren." } ], "product_status": { "known_affected": [ "T039554" ] }, "release_date": "2024-12-03T23:00:00.000+00:00", "title": "CVE-2024-42453" }, { "cve": "CVE-2024-42456", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Veeam Backup \u0026 Replication. Diese Fehler sind auf eine unzureichende Privilegienvalidierung, die fehlende Einschr\u00e4nkung von Privilegien f\u00fcr den Zugriff auf kritische Methoden und auf unzureichende Autorisierungspr\u00fcfungen zur\u00fcckzuf\u00fchren. Ein entfernter, authentisierter Angreifer mit einer zugewiesenen Rolle kann diese Schwachstellen ausnutzen, um erh\u00f6hte Privilegien zu erlangen. Mit erh\u00f6hten Rechten kann der Angreifer Skripte als LocalSystem ausf\u00fchren, Dateien auf angeschlossene ESXi-Hosts hochladen, die Konfiguration angeschlossener virtueller Infrastruktur-Hosts kontrollieren und \u00e4ndern sowie Zugriff auf privilegierte Methoden erhalten und kritische Dienste kontrollieren." } ], "product_status": { "known_affected": [ "T039554" ] }, "release_date": "2024-12-03T23:00:00.000+00:00", "title": "CVE-2024-42456" }, { "cve": "CVE-2024-42451", "notes": [ { "category": "description", "text": "In Veeam Backup \u0026 Replication bestehen mehrere Schwachstellen, die auf eine unsachgem\u00e4\u00dfe oder unzureichende Zugriffskontrolle f\u00fcr gespeicherte Anmeldeinformationen und in der Remote-Verwaltungsschnittstelle sowie auf falsche Berechtigungen bei der Handhabung von Anmeldeinformationen zur\u00fcckzuf\u00fchren sind. Ein entfernter, authentisierter Angreifer mit einer zugewiesenen Rolle kann diese Schwachstellen ausnutzen, um vertrauliche Informationen, insbesondere Anmeldedaten und NTLM-Hashes, offenzulegen." } ], "product_status": { "known_affected": [ "T039554" ] }, "release_date": "2024-12-03T23:00:00.000+00:00", "title": "CVE-2024-42451" }, { "cve": "CVE-2024-42457", "notes": [ { "category": "description", "text": "In Veeam Backup \u0026 Replication bestehen mehrere Schwachstellen, die auf eine unsachgem\u00e4\u00dfe oder unzureichende Zugriffskontrolle f\u00fcr gespeicherte Anmeldeinformationen und in der Remote-Verwaltungsschnittstelle sowie auf falsche Berechtigungen bei der Handhabung von Anmeldeinformationen zur\u00fcckzuf\u00fchren sind. Ein entfernter, authentisierter Angreifer mit einer zugewiesenen Rolle kann diese Schwachstellen ausnutzen, um vertrauliche Informationen, insbesondere Anmeldedaten und NTLM-Hashes, offenzulegen." } ], "product_status": { "known_affected": [ "T039554" ] }, "release_date": "2024-12-03T23:00:00.000+00:00", "title": "CVE-2024-42457" }, { "cve": "CVE-2024-45204", "notes": [ { "category": "description", "text": "In Veeam Backup \u0026 Replication bestehen mehrere Schwachstellen, die auf eine unsachgem\u00e4\u00dfe oder unzureichende Zugriffskontrolle f\u00fcr gespeicherte Anmeldeinformationen und in der Remote-Verwaltungsschnittstelle sowie auf falsche Berechtigungen bei der Handhabung von Anmeldeinformationen zur\u00fcckzuf\u00fchren sind. Ein entfernter, authentisierter Angreifer mit einer zugewiesenen Rolle kann diese Schwachstellen ausnutzen, um vertrauliche Informationen, insbesondere Anmeldedaten und NTLM-Hashes, offenzulegen." } ], "product_status": { "known_affected": [ "T039554" ] }, "release_date": "2024-12-03T23:00:00.000+00:00", "title": "CVE-2024-45204" }, { "cve": "CVE-2024-42455", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Veeam Backup \u0026 Replication aufgrund einer unsicheren Deserialisierung von tempor\u00e4ren Dateien. Ein entfernter, authentisierter Angreifer mit einer zugewiesenen Rolle kann diesen Fehler ausnutzen, um sich mit entfernten Diensten zu verbinden und beliebige Dateien auf dem System mit Dienstkontorechten zu l\u00f6schen." } ], "product_status": { "known_affected": [ "T039554" ] }, "release_date": "2024-12-03T23:00:00.000+00:00", "title": "CVE-2024-42455" } ] }
wid-sec-w-2024-3602
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Veeam Backup \u0026 Replication ist eine Datensicherungsl\u00f6sung f\u00fcr VMware vSphere- und Microsoft Hyper-V-Umgebungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Veeam Backup \u0026 Replication ausnutzen, um seine Rechte zu erweitern, vertrauliche Informationen preiszugeben und Dateien zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3602 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3602.json" }, { "category": "self", "summary": "WID-SEC-2024-3602 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3602" }, { "category": "external", "summary": "Veeam Support Knowledge Base vom 2024-12-03", "url": "https://www.veeam.com/kb4693" } ], "source_lang": "en-US", "title": "Veeam Backup \u0026 Replication: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-12-03T23:00:00.000+00:00", "generator": { "date": "2024-12-04T11:46:04.114+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-3602", "initial_release_date": "2024-12-03T23:00:00.000+00:00", "revision_history": [ { "date": "2024-12-03T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c12.3", "product": { "name": "Veeam Backup \u0026 Replication \u003c12.3", "product_id": "T039554" } }, { "category": "product_version", "name": "12.3", "product": { "name": "Veeam Backup \u0026 Replication 12.3", "product_id": "T039554-fixed", "product_identification_helper": { "cpe": "cpe:/a:veeam:backup_and_replication:12.3" } } } ], "category": "product_name", "name": "Backup \u0026 Replication" } ], "category": "vendor", "name": "Veeam" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-40717", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Veeam Backup \u0026 Replication. Diese Fehler sind auf eine unzureichende Privilegienvalidierung, die fehlende Einschr\u00e4nkung von Privilegien f\u00fcr den Zugriff auf kritische Methoden und auf unzureichende Autorisierungspr\u00fcfungen zur\u00fcckzuf\u00fchren. Ein entfernter, authentisierter Angreifer mit einer zugewiesenen Rolle kann diese Schwachstellen ausnutzen, um erh\u00f6hte Privilegien zu erlangen. Mit erh\u00f6hten Rechten kann der Angreifer Skripte als LocalSystem ausf\u00fchren, Dateien auf angeschlossene ESXi-Hosts hochladen, die Konfiguration angeschlossener virtueller Infrastruktur-Hosts kontrollieren und \u00e4ndern sowie Zugriff auf privilegierte Methoden erhalten und kritische Dienste kontrollieren." } ], "product_status": { "known_affected": [ "T039554" ] }, "release_date": "2024-12-03T23:00:00.000+00:00", "title": "CVE-2024-40717" }, { "cve": "CVE-2024-42452", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Veeam Backup \u0026 Replication. Diese Fehler sind auf eine unzureichende Privilegienvalidierung, die fehlende Einschr\u00e4nkung von Privilegien f\u00fcr den Zugriff auf kritische Methoden und auf unzureichende Autorisierungspr\u00fcfungen zur\u00fcckzuf\u00fchren. Ein entfernter, authentisierter Angreifer mit einer zugewiesenen Rolle kann diese Schwachstellen ausnutzen, um erh\u00f6hte Privilegien zu erlangen. Mit erh\u00f6hten Rechten kann der Angreifer Skripte als LocalSystem ausf\u00fchren, Dateien auf angeschlossene ESXi-Hosts hochladen, die Konfiguration angeschlossener virtueller Infrastruktur-Hosts kontrollieren und \u00e4ndern sowie Zugriff auf privilegierte Methoden erhalten und kritische Dienste kontrollieren." } ], "product_status": { "known_affected": [ "T039554" ] }, "release_date": "2024-12-03T23:00:00.000+00:00", "title": "CVE-2024-42452" }, { "cve": "CVE-2024-42453", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Veeam Backup \u0026 Replication. Diese Fehler sind auf eine unzureichende Privilegienvalidierung, die fehlende Einschr\u00e4nkung von Privilegien f\u00fcr den Zugriff auf kritische Methoden und auf unzureichende Autorisierungspr\u00fcfungen zur\u00fcckzuf\u00fchren. Ein entfernter, authentisierter Angreifer mit einer zugewiesenen Rolle kann diese Schwachstellen ausnutzen, um erh\u00f6hte Privilegien zu erlangen. Mit erh\u00f6hten Rechten kann der Angreifer Skripte als LocalSystem ausf\u00fchren, Dateien auf angeschlossene ESXi-Hosts hochladen, die Konfiguration angeschlossener virtueller Infrastruktur-Hosts kontrollieren und \u00e4ndern sowie Zugriff auf privilegierte Methoden erhalten und kritische Dienste kontrollieren." } ], "product_status": { "known_affected": [ "T039554" ] }, "release_date": "2024-12-03T23:00:00.000+00:00", "title": "CVE-2024-42453" }, { "cve": "CVE-2024-42456", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Veeam Backup \u0026 Replication. Diese Fehler sind auf eine unzureichende Privilegienvalidierung, die fehlende Einschr\u00e4nkung von Privilegien f\u00fcr den Zugriff auf kritische Methoden und auf unzureichende Autorisierungspr\u00fcfungen zur\u00fcckzuf\u00fchren. Ein entfernter, authentisierter Angreifer mit einer zugewiesenen Rolle kann diese Schwachstellen ausnutzen, um erh\u00f6hte Privilegien zu erlangen. Mit erh\u00f6hten Rechten kann der Angreifer Skripte als LocalSystem ausf\u00fchren, Dateien auf angeschlossene ESXi-Hosts hochladen, die Konfiguration angeschlossener virtueller Infrastruktur-Hosts kontrollieren und \u00e4ndern sowie Zugriff auf privilegierte Methoden erhalten und kritische Dienste kontrollieren." } ], "product_status": { "known_affected": [ "T039554" ] }, "release_date": "2024-12-03T23:00:00.000+00:00", "title": "CVE-2024-42456" }, { "cve": "CVE-2024-42451", "notes": [ { "category": "description", "text": "In Veeam Backup \u0026 Replication bestehen mehrere Schwachstellen, die auf eine unsachgem\u00e4\u00dfe oder unzureichende Zugriffskontrolle f\u00fcr gespeicherte Anmeldeinformationen und in der Remote-Verwaltungsschnittstelle sowie auf falsche Berechtigungen bei der Handhabung von Anmeldeinformationen zur\u00fcckzuf\u00fchren sind. Ein entfernter, authentisierter Angreifer mit einer zugewiesenen Rolle kann diese Schwachstellen ausnutzen, um vertrauliche Informationen, insbesondere Anmeldedaten und NTLM-Hashes, offenzulegen." } ], "product_status": { "known_affected": [ "T039554" ] }, "release_date": "2024-12-03T23:00:00.000+00:00", "title": "CVE-2024-42451" }, { "cve": "CVE-2024-42457", "notes": [ { "category": "description", "text": "In Veeam Backup \u0026 Replication bestehen mehrere Schwachstellen, die auf eine unsachgem\u00e4\u00dfe oder unzureichende Zugriffskontrolle f\u00fcr gespeicherte Anmeldeinformationen und in der Remote-Verwaltungsschnittstelle sowie auf falsche Berechtigungen bei der Handhabung von Anmeldeinformationen zur\u00fcckzuf\u00fchren sind. Ein entfernter, authentisierter Angreifer mit einer zugewiesenen Rolle kann diese Schwachstellen ausnutzen, um vertrauliche Informationen, insbesondere Anmeldedaten und NTLM-Hashes, offenzulegen." } ], "product_status": { "known_affected": [ "T039554" ] }, "release_date": "2024-12-03T23:00:00.000+00:00", "title": "CVE-2024-42457" }, { "cve": "CVE-2024-45204", "notes": [ { "category": "description", "text": "In Veeam Backup \u0026 Replication bestehen mehrere Schwachstellen, die auf eine unsachgem\u00e4\u00dfe oder unzureichende Zugriffskontrolle f\u00fcr gespeicherte Anmeldeinformationen und in der Remote-Verwaltungsschnittstelle sowie auf falsche Berechtigungen bei der Handhabung von Anmeldeinformationen zur\u00fcckzuf\u00fchren sind. Ein entfernter, authentisierter Angreifer mit einer zugewiesenen Rolle kann diese Schwachstellen ausnutzen, um vertrauliche Informationen, insbesondere Anmeldedaten und NTLM-Hashes, offenzulegen." } ], "product_status": { "known_affected": [ "T039554" ] }, "release_date": "2024-12-03T23:00:00.000+00:00", "title": "CVE-2024-45204" }, { "cve": "CVE-2024-42455", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Veeam Backup \u0026 Replication aufgrund einer unsicheren Deserialisierung von tempor\u00e4ren Dateien. Ein entfernter, authentisierter Angreifer mit einer zugewiesenen Rolle kann diesen Fehler ausnutzen, um sich mit entfernten Diensten zu verbinden und beliebige Dateien auf dem System mit Dienstkontorechten zu l\u00f6schen." } ], "product_status": { "known_affected": [ "T039554" ] }, "release_date": "2024-12-03T23:00:00.000+00:00", "title": "CVE-2024-42455" } ] }
fkie_cve-2024-45204
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
support@hackerone.com | https://www.veeam.com/kb4693 | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
veeam | veeam_backup_\&_replication | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:veeam:veeam_backup_\\\u0026_replication:*:*:*:*:*:*:*:*", "matchCriteriaId": "97D6D507-5200-44A1-9122-C3CF8660C1C7", "versionEndExcluding": "12.3.0.310", "versionStartIncluding": "12.0.0.1402", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability exists where a low-privileged user can exploit insufficient permissions in credential handling to leak NTLM hashes of saved credentials. The exploitation involves using retrieved credentials to expose sensitive NTLM hashes, impacting systems beyond the initial target and potentially leading to broader security vulnerabilities." }, { "lang": "es", "value": "Existe una vulnerabilidad en la que un usuario con pocos privilegios puede aprovechar la falta de permisos en el manejo de credenciales para filtrar hashes NTLM de credenciales guardadas. La explotaci\u00f3n implica el uso de credenciales recuperadas para exponer hashes NTLM confidenciales, lo que afecta a sistemas m\u00e1s all\u00e1 del objetivo inicial y puede generar vulnerabilidades de seguridad m\u00e1s amplias." } ], "id": "CVE-2024-45204", "lastModified": "2025-04-24T16:59:33.837", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.1, "impactScore": 4.0, "source": "support@hackerone.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-12-04T02:15:05.233", "references": [ { "source": "support@hackerone.com", "tags": [ "Vendor Advisory" ], "url": "https://www.veeam.com/kb4693" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
ghsa-2m43-qgqq-69c7
Vulnerability from github
A vulnerability exists where a low-privileged user can exploit insufficient permissions in credential handling to leak NTLM hashes of saved credentials. The exploitation involves using retrieved credentials to expose sensitive NTLM hashes, impacting systems beyond the initial target and potentially leading to broader security vulnerabilities.
{ "affected": [], "aliases": [ "CVE-2024-45204" ], "database_specific": { "cwe_ids": [ "CWE-863" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-12-04T02:15:05Z", "severity": "HIGH" }, "details": "A vulnerability exists where a low-privileged user can exploit insufficient permissions in credential handling to leak NTLM hashes of saved credentials. The exploitation involves using retrieved credentials to expose sensitive NTLM hashes, impacting systems beyond the initial target and potentially leading to broader security vulnerabilities.", "id": "GHSA-2m43-qgqq-69c7", "modified": "2024-12-04T03:31:16Z", "published": "2024-12-04T03:31:16Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45204" }, { "type": "WEB", "url": "https://www.veeam.com/kb4693" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "type": "CVSS_V3" } ] }
CERTFR-2024-AVI-1039
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Veeam. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Veeam | Veeam Service Provider Console | Veeam Service Provider Console versions antérieures à 8.1.0.21999 | ||
Veeam | Veeam Agent | Veeam Agent pour Microsoft Windows versions antérieures à 6.3.0.177 | ||
Veeam | Veeam Backup & Replication | Veeam Backup & Replication versions antérieures à 12.3.0.310 |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Veeam Service Provider Console versions ant\u00e9rieures \u00e0 8.1.0.21999", "product": { "name": "Veeam Service Provider Console", "vendor": { "name": "Veeam", "scada": false } } }, { "description": "Veeam Agent pour Microsoft Windows versions ant\u00e9rieures \u00e0 6.3.0.177", "product": { "name": "Veeam Agent", "vendor": { "name": "Veeam", "scada": false } } }, { "description": "Veeam Backup \u0026 Replication versions ant\u00e9rieures \u00e0 12.3.0.310", "product": { "name": "Veeam Backup \u0026 Replication", "vendor": { "name": "Veeam", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-40717", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40717" }, { "name": "CVE-2024-42453", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42453" }, { "name": "CVE-2024-42456", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42456" }, { "name": "CVE-2024-45204", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45204" }, { "name": "CVE-2024-42457", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42457" }, { "name": "CVE-2024-42449", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42449" }, { "name": "CVE-2024-42452", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42452" }, { "name": "CVE-2024-42451", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42451" }, { "name": "CVE-2024-45207", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45207" }, { "name": "CVE-2024-42455", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42455" }, { "name": "CVE-2024-42448", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42448" } ], "initial_release_date": "2024-12-04T00:00:00", "last_revision_date": "2024-12-04T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-1039", "revisions": [ { "description": "Version initiale", "revision_date": "2024-12-04T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Veeam. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Veeam", "vendor_advisories": [ { "published_at": "2024-12-03", "title": "Bulletin de s\u00e9curit\u00e9 Veeam kb4693", "url": "https://www.veeam.com/kb4693" }, { "published_at": "2024-12-03", "title": "Bulletin de s\u00e9curit\u00e9 Veeam kb4679", "url": "https://www.veeam.com/kb4679" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.