Severe Veeam Vulnerabilities (CVE-2024-42448, CVE-2024-42449)

Published:

spot_img

Critical Security Advisory: Veeam Service Provider Console Vulnerabilities

Veeam Issues Urgent Advisory Over Critical Vulnerabilities in Service Provider Console

In a significant security alert, Veeam has announced critical vulnerabilities affecting its Veeam Service Provider Console (VSPC), particularly in version 8.1.0.21377 and earlier builds from version 7. The vulnerabilities, identified as CVE-2024-42448 and CVE-2024-42449, pose severe risks to service providers, potentially compromising system integrity, data confidentiality, and overall network security.

Disclosed in Veeam’s December 2024 updates, CVE-2024-42448 has been classified as critical, allowing for Remote Code Execution (RCE). This flaw enables attackers to execute arbitrary code on the VSPC server by gaining access to an authorized management agent machine. With a CVSS v3.1 score of 9.9, this vulnerability represents a grave threat to organizations relying on Veeam for backup management.

The second vulnerability, CVE-2024-42449, while slightly less severe with a CVSS score of 7.1, still poses a significant risk. It allows attackers to leak NTLM hashes of the VSPC server’s service account and delete files on the server, potentially leading to further data breaches.

In response to these vulnerabilities, Veeam has released a critical patch, urging all users of the affected versions to upgrade to build 8.1.0.21999. This update is essential, as no mitigations exist for the vulnerabilities aside from upgrading. Organizations are strongly advised to act swiftly to protect their systems from potential exploits that could lead to data loss or security breaches.

As the cybersecurity landscape continues to evolve, timely patching remains the best defense against vulnerabilities. Veeam users must prioritize updating their systems to ensure robust protection against these critical threats.

spot_img

Related articles

Recent articles

Malicious PyPI Package Masquerades as SymPy to Install XMRig Miner on Linux Systems

Malicious Python Package Found in PyPI: A New Cryptojacking Threat Overview of the Threat A newly identified malicious package in the Python Package Index (PyPI) is...

Ingram Micro Data Breach: Ransomware Attack Impacts 42,000+ Individuals

Ingram Micro Data Breach: Insights into the Cybersecurity Incident In recent news, Ingram Micro, one of the leading distributors of IT products globally, has confirmed...

500+ Officials Join Webinar on I4C Bank Account Freezing Rules

Navigating the Storm: A Deep Dive into India's Cyber Fraud Response Mechanism On January 21, over 500 professionals—including police officers, bankers, lawyers, prosecutors, and compliance...

EU to Eliminate High-Risk Mobile and Telecom Network Products

The European Commission has introduced a comprehensive cybersecurity legislative package aimed at enhancing the safety of Information and Communication Technologies (ICT) supply...