Veeam Releases Updates for Service Provider Console and Backup & Replication
The security updates address one critical and ten high severity vulnerabilities
Summary
The security updates address one critical and ten high severity vulnerabilities
Affected platforms
The following platforms are known to be affected:
Threat details
Introduction
Veeam has released updates addressing one critical and one high severity vulnerability in Service Provider Console. Nine further high severity vulnerabilities, eight in Backup & Replication and one in Veeam Agent for Microsoft Windows, were also addressed. A few vulnerabilities of note are listed below.
Vulnerability Details
Two vulnerabilities affect Veeam Service Provider Console:
- CVE-2024-42448 has a CVSSv3 score of 9.9 and could allow an attacker with low privileges to achieve remote code execution (RCE) on the VSPC server machine.
- CVE-2024-42449 has a CVSSv3 score of 7.1 and could allow an attacker with low privileges to leak the NTLM hash of the VSPC server service account and delete files on the VSPC server.
Eight further high severity vulnerabilities affect Veeam Backup & Replication. Four are highlighted:
- CVE-2024-40717 has a CVSSv3 score of 8.8 and could allow an authenticated attacker with a role assigned in the 'Users and Roles settings' on the backup server to execute a script with elevated privileges.
- CVE-2024-42452 has a CVSSv3 score of 8.8 and could allow an authenticated attacker to remotely upload files to connected ESXi hosts.
- CVE-2024-42453 has a CVSSv3 score of 8.8 and could allow an authenticated attacker to modify the configuration of connected virtual infrastructure hosts.
- CVE-2024-42456 has a CVSSv3 score of 8.8 and could allow an authenticated attacker to gain access to privileged methods and control critical services.
One further vulnerability affects Veeam Agent for Microsoft Windows.
- CVE-2024-45207 has a CVSSv3 score of 7.0 and could lead to a DLL injection attack when the PATH environment variable is altered to include directories where an attacker can write files.
Remediation advice
Affected organisations are encouraged to review the Veeam Advisories kb4679 and kb4693, and apply the relevant updates.
Definitive source of threat updates
CVE Vulnerabilities
Last edited: 4 December 2024 3:30 pm