Researcher Sina Kheirkha analyzed the Veeam Backup Enterprise Manager authentication bypass flaw CVE-2024-29849<\/a> and a proof of concept exploit for this issue.<\/p>\n\n\n\n
\u201cThis vulnerability in Veeam Backup Enterprise Manager<\/strong> allows an unauthenticated attacker to log in to the Veeam Backup Enterprise Manager web interface as any user.\u201d reads the advisory<\/a> published by the vendor.<\/p>\n\n\n\n
The vulnerability was addressed with the release of version 12.1.2.172<\/a>. The company also provided the following mitigation:<\/p>\n\n\n\n
Administrators are urged to apply the latest security updates as soon as possible due to the availability of the PoC.
Kheirkha explained that the issue resides in the ‘Veeam.Backup.Enterprise.RestAPIService.exe’ service (vVeeamRESTSvc<\/code> ), which is installed during the setup of the Veeam enterprise manager software.<\/p>\n\n\n\n
“When I started to analyze this vulnerability, first I was kind of disappointed on how little information veeam provided, just saying the authentication can be bypassed and not much more, however, just knowing it\u2019s something to do with Authentication<\/strong> and the mitigation suggesting the issue has something to do with the either \u201cVeeamEnterpriseManagerSvc\u201d or \u201cVeeamRESTSvc\u201d services, I began my patch diffing routine and realized the entry point, I\u2019ll introduce
VeeamRESTSvc<\/code> also known as
Veeam.Backup.Enterprise.RestAPIService.exe<\/code>” reads the
post<\/strong><\/a> published by the researcher.<\/p>\n\n\n\n
C:\\ProgramData\\Veeam\\Backup\\Svc.VeeamRestAPI.log\n<\/code><\/pre>\n\n\n\nsearching for\u00a0Validating Single Sign-On token. Service enpoint URL:<\/code>\u00a0<\/p>\n\n\n\n