{"id":28996,"date":"2023-03-09T07:03:07","date_gmt":"2023-03-09T06:03:07","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=28996"},"modified":"2023-03-10T11:36:06","modified_gmt":"2023-03-10T10:36:06","slug":"veeam-fixes-critical-vulnerability-cve-2023-27532-in-backup-replication-v11a-v12","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2023\/03\/09\/veeam-fixes-critical-vulnerability-cve-2023-27532-in-backup-replication-v11a-v12\/","title":{"rendered":"Veeam fixes critical vulnerability CVE-2023-27532 in Backup &#038; Replication V11a\/V12"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline; border-width: 0px;\" title=\"Amazon\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/HD01.jpg\" alt=\"Amazon\" width=\"84\" height=\"66\" align=\"left\" border=\"0\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2023\/03\/08\/veeam-fixt-kritische-schwachstelle-cve-2023-27532-in-backup-replication-v11a-v12\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]A small note for users of the backup software from the manufacturer Veeam. As of March 7, 2023, Veeam has fixed a critical vulnerability (CVE-2023-27532) in its Backup &amp; Replication product in versions V11a\/V12 via an update. The update via a cumulative update should be applied promptly. <strong>Update:<\/strong> There is now an exploit, exploitation likely soon.<\/p>\n<p><!--more--><\/p>\n<h2>Veeam Backup &amp; Replication<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg09.met.vgwort.de\/na\/df9b887b4d494b13bb642d4999d67f1a\" alt=\"\" width=\"1\" height=\"1\" \/>Veeam is a vemdpr of backup and replication software for bare metal and virtual machines. <a href=\"https:\/\/www.veeam.com\/de\/vm-backup-recovery-replication-software.html\" target=\"_blank\" rel=\"noopener\">Veeam Backup &amp; Replication<\/a> is a proprietary backup application developed by Veeam for virtual environments based on VMware vSphere, Nutanix AHV and Microsoft Hyper-V hypervisors. The software provides backup, recovery and replication capabilities for virtual machines, physical servers and workstations, and cloud-based workloads.<\/p>\n<h2>A readers note on a vulnerability<\/h2>\n<p>German blog reader Wolfgang F. emailed me today about the issue (thanks for that) and wrote me regarding the vulnerability in Veeam Backup &amp; Replication V11a\/V12.<\/p>\n<blockquote><p>Good day Mr. Born,<\/p>\n<p>I'm a bit unsure now if this fits in your blog topic block as well, but otherwise just to let you know.<\/p>\n<p>This message reached me yesterday from Veeam, one or probably the leading manufacturer of backup software at least for Virtual Infrastructures.<\/p>\n<p>The mail is probably valid, the links lead to the correct Veeam pages and the SHA values of the download fit as well.<\/p>\n<p>Therefore I assume a valid message.<\/p>\n<p>I have implemented the update for my version 11, so far no problems.<\/p><\/blockquote>\n<p>Wolfgang then shared a link to Veeam support post <a href=\"https:\/\/www.veeam.com\/kb4245\" target=\"_blank\" rel=\"noopener\">kb4245<\/a> (<em>Release Information for Veeam Backup &amp; Replication 11a Cumulative Patches<\/em>), which deals with the cumulative updates for said software. With the latest change dated March 7, 2023, the following information &#8211; which I pulled from various sources &#8211; was released:<\/p>\n<blockquote><p><b>P20230227: <\/b>Vulnerability (<a href=\"https:\/\/www.veeam.com\/kb4424?ad=in-text-link\" target=\"_blank\" rel=\"noopener\">CVE-2023-27532<\/a>) in Veeam Backup Service was fixed.<\/p>\n<p>Vulnerability CVE-2023-27532 in Veeam Backup &amp; Replication component allows to obtain encrypted credentials stored in the configuration database. This may lead to gaining access to the backup infrastructure hosts.<\/p>\n<p><b>Severity:<\/b> High<br \/>\n<b>CVSS v3 score:<\/b> 7.5<\/p><\/blockquote>\n<p>Vulnerability CVE-2023-27532 in Veeam Backup &amp; Replication allows third parties to access encrypted credentials in the configuration database. This can give attackers access to the hosts of the backup infrastructure. The Veeam community also has a post <a href=\"https:\/\/community.veeam.com\/blogs-and-podcasts-57\/vulnerability-in-veeam-backup-replication-march-2023-4361\" target=\"_blank\" rel=\"noopener\">Vulnerability in Veeam Backup &amp; Replication &#8211; March 2023<\/a>. The following information and links are relevant:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.veeam.com\/download_add_packs\/vmware-esx-backup\/kb4245\" target=\"_blank\" rel=\"noopener\">Patch for Veeam V11a<\/a><\/li>\n<li><a href=\"https:\/\/www.veeam.com\/kb4245\" target=\"_blank\" rel=\"noopener\">KB article for V11<\/a><\/li>\n<li><a href=\"https:\/\/www.veeam.com\/download_add_packs\/vmware-esx-backup\/kb4420\" target=\"_blank\" rel=\"noopener\">Patch for Veeam V12<\/a><\/li>\n<li><a href=\"https:\/\/www.veeam.com\/kb4420\" target=\"_blank\" rel=\"noopener\">KB article for V12<\/a><\/li>\n<\/ul>\n<p>For users who cannot install the patch immediately, the following workaround can be found in the community post:<\/p>\n<blockquote><p>As a temporary workaround you can block access to TCP port 9401 on your Veeam Backup &amp; Replication server. This will affect the connection of mount servers to the VBR server, so only use this if you don't have a distributed Veeam environment. And still apply the patch as soon as possible.<\/p><\/blockquote>\n<p>Those who have recently installed the cumulative patches V11 or V12 should check the ISO image used for the installation. Builds 20230227 (V11) and 20230223 (V12) already contain the patches and are therefore no longer vulnerable.<\/p>\n<h2>Exploit developed, attacks on the horizon<\/h2>\n<p><strong>Addenum:<\/strong> On March 10, 2023 I became aware of the following tweet &#8211; a security researcher has developed an exploit &#8211; attacks on the horizon.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" title=\"Exploit for CVE-2023-27532 in Veeam Backup &amp; Replication\" src=\"https:\/\/i.imgur.com\/inYCuLe.png\" alt=\"Exploit for CVE-2023-27532 in Veeam Backup &amp; Replication\" width=\"587\" height=\"522\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]A small note for users of the backup software from the manufacturer Veeam. As of March 7, 2023, Veeam has fixed a critical vulnerability (CVE-2023-27532) in its Backup &amp; Replication product in versions V11a\/V12 via an update. The update via &hellip; <a href=\"https:\/\/borncity.com\/win\/2023\/03\/09\/veeam-fixes-critical-vulnerability-cve-2023-27532-in-backup-replication-v11a-v12\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547,2],"tags":[571,69,1544],"class_list":["post-28996","post","type-post","status-publish","format-standard","hentry","category-security","category-software","category-windows","tag-backup","tag-security","tag-software"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/28996","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=28996"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/28996\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=28996"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=28996"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=28996"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}