A series of related high-severity vulnerabilities, the most notable enabling remote code execution (RCE) as the service account and extraction of sensitive information (savedcredentials and passwords). Exploiting these vulnerabilities requires a user who has been assigned a low-privileged role within Veeam Backup & Replication.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.veeam.com/kb4649 |
![]() ![]() |
History
Mon, 09 Sep 2024 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Veeam
Veeam backup \& Replication |
|
Weaknesses | CWE-522 | |
CPEs | cpe:2.3:a:veeam:backup_\&_replication:*:*:*:*:*:*:*:* | |
Vendors & Products |
Veeam
Veeam backup \& Replication |
|
Metrics |
ssvc
|
Sat, 07 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A series of related high-severity vulnerabilities, the most notable enabling remote code execution (RCE) as the service account and extraction of sensitive information (savedcredentials and passwords). Exploiting these vulnerabilities requires a user who has been assigned a low-privileged role within Veeam Backup & Replication. | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-09-09T16:28:11.865Z
Reserved: 2024-07-09T01:04:07.424Z
Link: CVE-2024-40710

Updated: 2024-09-09T16:27:26.917Z

Status : Awaiting Analysis
Published: 2024-09-07T17:15:13.110
Modified: 2024-09-09T17:35:04.207
Link: CVE-2024-40710

No data.