{"id":164407,"date":"2024-06-11T09:14:55","date_gmt":"2024-06-11T09:14:55","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=164407"},"modified":"2024-06-11T09:19:04","modified_gmt":"2024-06-11T09:19:04","slug":"veeam-cve-2024-29849-poc","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/164407\/hacking\/veeam-cve-2024-29849-poc.html","title":{"rendered":"Expert released PoC exploit code for Veeam Backup Enterprise Manager flaw CVE-2024-29849. Patch it now!"},"content":{"rendered":"
<\/div>\n

A proof-of-concept (PoC) exploit code for a\u00a0Veeam Backup Enterprise Manager authentication bypass flaw CVE-2024-29849 is publicly available.<\/h2>\n\n\n\n

Researcher Sina Kheirkha analyzed the Veeam Backup Enterprise Manager authentication bypass flaw CVE-2024-29849<\/a> and a proof of concept exploit for this issue.<\/p>\n\n\n\n

The flaw CVE-2024-29849 is a critical vulnerability (CVSS score: 9.8) in Veeam Backup Enterprise Manager that could allow attackers to bypass authentication.<\/p>\n\n\n\n

Veeam Backup Enterprise Manager is a centralized management and reporting tool designed to simplify the administration of Veeam Backup & Replication environments. It offers a web-based interface that allows users to manage multiple Veeam Backup & Replication servers, monitor backup jobs, and generate reports.<\/gwmw><\/p>\n\n\n\n

\u201cThis vulnerability in Veeam Backup Enterprise Manager<\/strong> allows an unauthenticated attacker to log in to the Veeam Backup Enterprise Manager web interface as any user.\u201d reads the advisory<\/a> published by the vendor.<\/p>\n\n\n\n

The vulnerability was addressed with the release of version 12.1.2.172<\/a>. The company also provided the following mitigation:<\/p>\n\n\n\n