Veeam security updates to address multiple vulnerabilities impacting its products, the company fixed 18 high and critical severity flaws in\u00a0Veeam Backup & Replication,\u00a0Service Provider Console, and One.<\/p>\n\n\n\n
The most severe flaw included in the September 2024\u00a0security bulletin is\u00a0a critical, remote code execution (RCE) vulnerability tracked as CVE-2024-40711 (CVSS v3.1 score: 9.8) impacting Veeam Backup & Replication (VBR). <\/p>\n\n\n\n
Veeam Backup & Replication is a comprehensive data protection and disaster recovery software developed by Veeam. It enables organizations to back up, restore, and replicate data across physical, virtual, and cloud environments.
“A vulnerability allowing unauthenticated remote code execution (RCE).” reads the advisory<\/a>.<\/em><\/p>\n\n\n\n
The flaw impacts Veeam Backup & Replication 12.1.2.172\u00a0and all\u00a0earlier version 12 builds<\/a>.\u00a0<\/p>\n\n\n\n
The company also addressed a vulnerability, tracked as CVE-2024-40713 (CVSS v3.1 score: 8.8) that allows a user who has been assigned\u00a0a low-privileged role within Veeam Backup & Replication<\/a>\u00a0to alter Multi-Factor Authentication (MFA) settings and bypass MFA.<\/p>\n\n\n\n
The company also fixes a series of related high-severity vulnerabilities tracked as CVE-2024-40710, the most notable one could lead to remote code execution (RCE) as the service account and extraction of sensitive information (saved credentials and passwords). The exploitation of these vulnerabilities requires a user who has been assigned\u00a0a low-privileged role within Veeam Backup & Replication<\/a>.
The remaining issues covered by the bulletin impact Service Provider Console, and One software. <\/p>\n\n\n\n
The company did not disclose whether any of the issues in the bulletin had been exploited in attacks in the wild.<\/p>\n\n\n\n
Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/p>\n\n\n\n
Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n
(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking,\u00a0Veeam Backup & Replication<\/a>)<\/strong><\/p>\n\n\n\n