Severe Veeam Vulnerabilities (CVE-2024-42448, CVE-2024-42449)

Published:

Critical Security Advisory: Veeam Service Provider Console Vulnerabilities

Veeam Issues Urgent Advisory Over Critical Vulnerabilities in Service Provider Console

In a significant security alert, Veeam has announced critical vulnerabilities affecting its Veeam Service Provider Console (VSPC), particularly in version 8.1.0.21377 and earlier builds from version 7. The vulnerabilities, identified as CVE-2024-42448 and CVE-2024-42449, pose severe risks to service providers, potentially compromising system integrity, data confidentiality, and overall network security.

Disclosed in Veeam’s December 2024 updates, CVE-2024-42448 has been classified as critical, allowing for Remote Code Execution (RCE). This flaw enables attackers to execute arbitrary code on the VSPC server by gaining access to an authorized management agent machine. With a CVSS v3.1 score of 9.9, this vulnerability represents a grave threat to organizations relying on Veeam for backup management.

The second vulnerability, CVE-2024-42449, while slightly less severe with a CVSS score of 7.1, still poses a significant risk. It allows attackers to leak NTLM hashes of the VSPC server’s service account and delete files on the server, potentially leading to further data breaches.

In response to these vulnerabilities, Veeam has released a critical patch, urging all users of the affected versions to upgrade to build 8.1.0.21999. This update is essential, as no mitigations exist for the vulnerabilities aside from upgrading. Organizations are strongly advised to act swiftly to protect their systems from potential exploits that could lead to data loss or security breaches.

As the cybersecurity landscape continues to evolve, timely patching remains the best defense against vulnerabilities. Veeam users must prioritize updating their systems to ensure robust protection against these critical threats.

Related articles

Recent articles