{"id":168088,"date":"2024-09-05T19:57:35","date_gmt":"2024-09-05T19:57:35","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=168088"},"modified":"2024-09-05T19:57:37","modified_gmt":"2024-09-05T19:57:37","slug":"veeam-backup-replication-cve-2024-40711","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/168088\/security\/veeam-backup-replication-cve-2024-40711.html","title":{"rendered":"Veeam fixed a critical flaw in Veeam Backup & Replication software"},"content":{"rendered":"
<\/div>\n

Veeam addressed 18 high and critical severity flaws in\u00a0Veeam Backup & Replication,\u00a0Service Provider Console, and One.<\/h2>\n\n\n\n

Veeam security updates to address multiple vulnerabilities impacting its products, the company fixed 18 high and critical severity flaws in\u00a0Veeam Backup & Replication,\u00a0Service Provider Console, and One.<\/p>\n\n\n\n

The most severe flaw included in the September 2024\u00a0security bulletin is\u00a0a critical, remote code execution (RCE) vulnerability tracked as CVE-2024-40711 (CVSS v3.1 score: 9.8) impacting Veeam Backup & Replication (VBR). <\/p>\n\n\n\n

Veeam Backup & Replication is a comprehensive data protection and disaster recovery software developed by Veeam. It enables organizations to back up, restore, and replicate data across physical, virtual, and cloud environments.<\/gwmw><\/p>\n\n\n\n

“A vulnerability allowing unauthenticated remote code execution (RCE).” reads the advisory<\/a>.<\/em><\/p>\n\n\n\n

Florian Hauser, cybersecurity researcher at CODE WHITE Gmbh, reported this vulnerability.<\/p>\n\n\n\n

The flaw impacts Veeam Backup & Replication 12.1.2.172\u00a0and all\u00a0earlier version 12 builds<\/a>.\u00a0<\/p>\n\n\n\n

The company also addressed a vulnerability, tracked as CVE-2024-40713 (CVSS v3.1 score: 8.8) that allows a user who has been assigned\u00a0a low-privileged role within Veeam Backup & Replication<\/a>\u00a0to alter Multi-Factor Authentication (MFA) settings and bypass MFA.<\/p>\n\n\n\n

The company also fixes a series of related high-severity vulnerabilities tracked as CVE-2024-40710, the most notable one could lead to remote code execution (RCE) as the service account and extraction of sensitive information (saved credentials and passwords). The exploitation of these vulnerabilities requires a user who has been assigned\u00a0a low-privileged role within Veeam Backup & Replication<\/a>.<\/gwmw><\/p>\n\n\n\n

The other issues included in the bulletin are impacting Backup & Replication versions 12.1.2.172 and older are:<\/p>\n\n\n\n