Article Details

Scrape Timestamp (UTC): 2024-05-22 03:54:31.290

Source: https://thehackernews.com/2024/05/critical-veeam-backup-enterprise.html

Original Article Text

Click to Toggle View

Critical Veeam Backup Enterprise Manager Flaw Allows Authentication Bypass. Users of Veeam Backup Enterprise Manager are being urged to update to the latest version following the discovery of a critical security flaw that could permit an adversary to bypass authentication protections. Tracked as CVE-2024-29849 (CVSS score: 9.8), the vulnerability could allow an unauthenticated attacker to log in to the Veeam Backup Enterprise Manager web interface as any user. The company has also disclosed three other shortcomings impacting the same product - All the flaws have been addressed in version 12.1.2.172. However, Veeam noted that deploying Veeam Backup Enterprise Manager is optional and that environments that do not have it installed are not impacted by the flaws. In recent weeks, the company has also resolved a local privilege escalation flaw affecting the Veeam Agent for Windows (CVE-2024-29853, CVSS score: 7.2) and a critical remote code execution bug impacting Veeam Service Provider Console (CVE-2024-29212, CVSS score: 9.9).

Daily Brief Summary

CYBERCRIME // Critical Authentication Flaw Fixed in Veeam Backup Enterprise Manager

A critical vulnerability in Veeam Backup Enterprise Manager allows authentication bypass.

Tracked as CVE-2024-29849 with a CVSS score of 9.8, it enables unauthorized login as any user.

Veeam has issued a fix in version 12.1.2.172, along with patches for three other related issues.

Affected product is optional; environments without it installed remain unaffected.

Additional fixes include a local privilege escalation in Veeam Agent for Windows and a critical remote code execution in Veeam Service Provider Console.

Users are advised to update their software to mitigate potential cybersecurity risks.