Veeam Exploitation PoC Published - 20240611002¶
Overview¶
Since the publication of Advisory 20240522003, a proof-of-concept (PoC) exploit for Veeam Backup Enterprise Manager and Veeam Recovery Orchestrator products are now publicly available.
What is vulnerable?¶
Product(s) Affected | CVE | Severity | CVSS |
---|---|---|---|
Veeam Backup Enterprise Manager: All versions below 12.1.2.172 | CVE-2024-29849 CVE-2024-29850 CVE-2024-29851 CVE-2024-29852 | Critical High High Low | 9.8 8.8 7.2 2.7 |
Veeam Recovery Orchestrator 7.1: All versions below 7.1.0.230 Veeam Recovery Orchestrator 7.0: All versions below 7.0.0.379 | CVE-2024-29855 | Critical | 9.8 |
Recommendation¶
The WA SOC recommends administrators apply the latest solutions as per vendor instructions to all affected devices within expected timeframe of 48 Hours... (refer Patch Management):
- Veeam Backup Enterprise Manager: https://www.veeam.com/kb4581
- Veeam Recovery Orchestrator: https://www.veeam.com/kb4585
Additional Resources¶
- Tenable CVE articles:
- CVE-2024-29849: https://www.tenable.com/cve/CVE-2024-29849
- CVE-2024-29855: https://www.tenable.com/cve/CVE-2024-29855
- BleepingComputer article: https://www.bleepingcomputer.com/news/security/exploit-for-critical-veeam-auth-bypass-available-patch-now/