{"id":34924,"date":"2024-09-06T02:02:42","date_gmt":"2024-09-06T00:02:42","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=34924"},"modified":"2024-09-06T08:13:18","modified_gmt":"2024-09-06T06:13:18","slug":"veeam-warns-of-critical-rce-vulnerability-cve-2024-4071-in-backup-replication","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2024\/09\/06\/veeam-warns-of-critical-rce-vulnerability-cve-2024-4071-in-backup-replication\/","title":{"rendered":"Veeam warns of critical RCE vulnerability CVE-2024-4071 in Backup &#038; Replication"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2024\/09\/06\/veeam-warnt-vor-kritischer-rce-schwachstelle-cve-2024-4071-in-backup-replication\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Veeam warns of a critical RCE vulnerability in Backup &amp; Replication. Blog reader j. pointed out the vulnerability yesterday in the discussion area (thanks for that) &#8211; but I had already heard about it elsewhere. The vulnerability CVE-2024-4071 was classified with a CVSS index of 9.8, so it should be fixed as soon as possible. Veeam has therefore published corresponding updates to its Backup &amp; Replication software to close these vulnerabilities. But there are other vulnerabilities in various products. Here is a brief overview of this topic.<\/p>\n<p><!--more--><\/p>\n<h2>Vulnerabilities in several products<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg07.met.vgwort.de\/na\/30566051985e48efa10cb0c8ecf5ef38\" alt=\"\" width=\"1\" height=\"1\" \/>Veeam published <a href=\"https:\/\/www.veeam.com\/kb4649\" target=\"_blank\" rel=\"noopener\">Security Bulletin kb4649<\/a> on September 4, 2024 and modified it again on September 5. This document discloses a whole series of vulnerabilities in various products. Subsequent products should be updated promptly.<\/p>\n<p>Veeam Backup &amp; Replication<br \/>\nVeeam ONE<br \/>\nVeeam Service Provider Console<br \/>\nVeeam Agent <i>for Linux<\/i><br \/>\nVeeam Backup <i>for Nutanix AHV<\/i><br \/>\nVeeam Backup <i>for Oracle Linux Virtualization Manager and Red Hat Virtualization<\/i><\/p>\n<h2>RCE vulnerability CVE-2024-4071 and more<\/h2>\n<p>The following vulnerabilities affect Veeam Backup &amp; Replication 12.1.2.172 and <a href=\"https:\/\/www.veeam.com\/kb2680\" target=\"_blank\" rel=\"noopener\">earlier builds of version 12<\/a> as well as older versions. Here is a brief overview:<\/p>\n<ul>\n<li>CVE-2024-40711: The above mentioned vulnerability, which is the unauthenticated remote code execution (RCE) vulnerability reported by Florian Hauser of CODE WHITE Gmbh. CVSS v3.1 Score: 9.8, critical; There are currently no details on this critical vulnerability.<\/li>\n<li>CVE-2024-40713: A vulnerability that allows a user <a href=\"https:\/\/helpcenter.veeam.com\/docs\/backup\/vsphere\/configuring_users.html\" target=\"_blank\" rel=\"noopener\">assigned a low privileged role<\/a> in Veeam Backup &amp; Replication to change multi-factor authentication (MFA) settings and bypass MFA. CVSS v3.1 Score: 8.8, high<\/li>\n<li>CVE-2024-40710: A set of related high-severity vulnerabilities, one of which allows remote code execution (RCE) as a service account and extraction of sensitive information (stored credentials and passwords). Exploitation of these vulnerabilities requires a user <a href=\"https:\/\/helpcenter.veeam.com\/docs\/backup\/vsphere\/configuring_users.html\" target=\"_blank\" rel=\"noopener\">assigned a low privileged role<\/a> within Veeam Backup &amp; Replication. CVSS v3.1 Score: 8.8, high<\/li>\n<li>CVE-2024-39718: A vulnerability that allows a user with low privileges to remotely remove files on the system with the same permissions as the service account. CVSS v3.1 Score: 8.1, high<\/li>\n<li>CVE-2024-40714: A vulnerability in TLS certificate validation allows an attacker on the same network to intercept sensitive credentials during recovery operations. CVSS v3.1 Score: 8.3, high<\/li>\n<li>CVE-2024-40712: A path traversal vulnerability allows an attacker with a low privileged account and local access to the system to perform local privilege escalation (LPE). CVSS v3.1 Score: 7.8, high<\/li>\n<\/ul>\n<p>All of the above vulnerabilities are fixed in <a href=\"https:\/\/www.veeam.com\/kb4600\" target=\"_blank\" rel=\"noopener\">Veeam Backup &amp; Replication 12.2 (build 12.2.0.334)<\/a>. Details, including the vulnerabilities in the other Veeam products listed above, can be found in <a href=\"https:\/\/www.veeam.com\/kb4649\" target=\"_blank\" rel=\"noopener\">Security Bulletin kb4649<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Veeam warns of a critical RCE vulnerability in Backup &amp; Replication. Blog reader j. pointed out the vulnerability yesterday in the discussion area (thanks for that) &#8211; but I had already heard about it elsewhere. The vulnerability CVE-2024-4071 was classified &hellip; <a href=\"https:\/\/borncity.com\/win\/2024\/09\/06\/veeam-warns-of-critical-rce-vulnerability-cve-2024-4071-in-backup-replication\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547],"tags":[69,1544],"class_list":["post-34924","post","type-post","status-publish","format-standard","hentry","category-security","category-software","tag-security","tag-software"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/34924","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=34924"}],"version-history":[{"count":1,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/34924\/revisions"}],"predecessor-version":[{"id":34925,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/34924\/revisions\/34925"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=34924"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=34924"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=34924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}