Skip to main content

Veeam Releases Updates for Service Provider Console and Backup & Replication

The security updates address one critical and ten high severity vulnerabilities

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

The security updates address one critical and ten high severity vulnerabilities


Threat details

Introduction

Veeam has released updates addressing one critical and one high severity vulnerability in Service Provider Console. Nine further high severity vulnerabilities, eight in Backup & Replication and one in Veeam Agent for Microsoft Windows, were also addressed. A few vulnerabilities of note are listed below.


Vulnerability Details

Two vulnerabilities affect Veeam Service Provider Console:

  • CVE-2024-42448 has a CVSSv3 score of 9.9 and could allow an attacker with low privileges to achieve remote code execution (RCE) on the VSPC server machine.
  • CVE-2024-42449 has a CVSSv3 score of 7.1 and could allow an attacker with low privileges to leak the NTLM hash of the VSPC server service account and delete files on the VSPC server.

Eight further high severity vulnerabilities affect Veeam Backup & Replication. Four are highlighted:

  • CVE-2024-40717 has a CVSSv3 score of 8.8 and could allow an authenticated attacker with a role assigned in the 'Users and Roles settings' on the backup server to execute a script with elevated privileges.
  • CVE-2024-42452 has a CVSSv3 score of 8.8 and could allow an authenticated attacker to remotely upload files to connected ESXi hosts.
  • CVE-2024-42453 has a CVSSv3 score of 8.8 and could allow an authenticated attacker to modify the configuration of connected virtual infrastructure hosts. 
  • CVE-2024-42456 has a CVSSv3 score of 8.8 and could allow an authenticated attacker to gain access to privileged methods and control critical services.

One further vulnerability affects Veeam Agent for Microsoft Windows. 

  • CVE-2024-45207 has a CVSSv3 score of 7.0 and could lead to a DLL injection attack when the PATH environment variable is altered to include directories where an attacker can write files.

Remediation advice

Affected organisations are encouraged to review the Veeam Advisories kb4679 and kb4693, and apply the relevant updates.



CVE Vulnerabilities

Last edited: 4 December 2024 3:30 pm