cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-42448,https://securityvulnerability.io/vulnerability/CVE-2024-42448,Remote Code Execution (RCE) Vulnerability in VSPC Management Agent,A remote code execution vulnerability exists in the VSPC management agent allowing an authorized agent on the server to execute arbitrary code on the VSPC server machine. This vulnerability can pose significant security risks by enabling unauthorized actions and data exposure on the affected systems.,Veeam,Service Provider Console,9.9,CRITICAL,0.0004299999854993075,false,,true,false,false,,,false,false,,2024-12-12T01:59:00.000Z,0 CVE-2024-42455,https://securityvulnerability.io/vulnerability/CVE-2024-42455,Low-Privileged User Can Exploit Insecure Deserialization to Delete Any File with Service Account Privileges,"A vulnerability within Veeam Backup & Replication enables low-privileged users to connect to remoting services and exploit weaknesses in the deserialization process. An attacker can send a serialized temporary file collection that is insufficiently validated, allowing them to delete any file on the system with the privileges of the service account. This flaw highlights the critical need for robust validation mechanisms during the deserialization process to prevent unauthorized actions on sensitive files and data.",Veeam,Backup & Replication,7.1,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-12-04T02:15:00.000Z,0 CVE-2024-42449,https://securityvulnerability.io/vulnerability/CVE-2024-42449,Arbitrary File Removal on VSPC Server,"A vulnerability within Veeam's VSPC management agent allows authorized management agents to execute unauthorized file deletions on the VSPC server. This capability poses significant security risks, as it can lead to data loss and server instability. Organizations utilizing Veeam solutions should assess their systems for this vulnerability to mitigate potential exploitation and ensure data integrity. Proper access controls and monitoring mechanisms are vital in defending against the unauthorized removal of critical files.",Veeam,Service Provider Console,7.1,HIGH,0.0004299999854993075,false,,true,false,false,,,false,false,,2024-12-04T02:15:00.000Z,0 CVE-2024-40715,https://securityvulnerability.io/vulnerability/CVE-2024-40715,Veeam Backup & Replication Enterprise Manager Vulnerability - Authentication Bypass,"A security vulnerability has been identified in Veeam Backup & Replication Enterprise Manager that can lead to authentication bypass. This vulnerability can be exploited by attackers through a Man-in-the-Middle (MITM) attack, enabling unauthorized access to sensitive information and functionalities. Organizations utilizing this software should be aware of the potential risks and implement appropriate security measures to protect their data.",Veeam,Enterprise Manager,7.7,HIGH,0.0006500000017695129,false,,false,false,false,,,false,false,,2024-11-07T16:40:37.566Z,0 CVE-2024-38650,https://securityvulnerability.io/vulnerability/CVE-2024-38650,Authentication Bypass Vulnerability Affects NTLM Hash of Service Account on VSPC Server,"An authentication bypass vulnerability exists in the Veeam Service Provider Console that can be exploited by low privileged attackers. This flaw allows unauthorized access to critical information, specifically the NTLM hash of service accounts. If exploited, this vulnerability could enable attackers to escalate their privileges and compromise the security of the system.",Veeam,Veeam Service Provider Console,9.9,CRITICAL,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-07T16:11:22.353Z,0 CVE-2024-42021,https://securityvulnerability.io/vulnerability/CVE-2024-42021,Improper Access Control Exposes Saved Credentials to Attackers,"An improper access control vulnerability exists in Veeam Backup and Replication, which can be exploited by an attacker possessing valid access tokens. This vulnerability permits unauthorized access to saved credentials, potentially compromising sensitive information. It is essential for users of Veeam Backup and Replication to assess their security measures and ensure adequate protections are in place to mitigate potential risks associated with this vulnerability.",Veeam,One,7.5,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-07T16:11:22.333Z,0 CVE-2024-42023,https://securityvulnerability.io/vulnerability/CVE-2024-42023,Remote Code Execution Vulnerability Affects Administrator Privileges,"The vulnerability disclosed allows low-privileged users within a Veeam Backup and Replication environment to execute arbitrary code with elevated Administrator privileges. This security gap could lead to unauthorized access and potential manipulation of critical backup operations, posing a significant risk to data integrity and system security. Users and administrators are encouraged to apply the latest security updates and adhere to best practices in configuring user privileges to mitigate this risk.",Veeam,One,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-07T16:11:22.238Z,0 CVE-2024-40718,https://securityvulnerability.io/vulnerability/CVE-2024-40718,Low-Privileged User Can Perform Local Privilege Escalation Through SSRF Vulnerability,"A vulnerability in Veeam's software allows low-privileged users to exploit server-side request forgery (SSRF) mechanisms. Through this vulnerability, attackers can potentially escalate their privileges locally, gaining unauthorized access to sensitive resources and compromising the security of the affected environment. This issue highlights the importance of safeguarding applications against SSRF attacks and emphasizes the necessity for rigorous security assessments of Veeam products.",Veeam,"Nutanix Ahv,Nutanix Kvm",8.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-07T16:11:22.238Z,0 CVE-2024-40714,https://securityvulnerability.io/vulnerability/CVE-2024-40714,Intercepting Sensitive Credentials During Restore Operations,"An improper certificate validation vulnerability has been identified in Veeam Backup & Replication, where inadequate checks during TLS certificate validation can be exploited by an attacker on the same network. This flaw potentially allows unauthorized interception of sensitive credentials during restore operations, posing a serious security threat to data integrity and confidentiality in enterprise environments.",Veeam,Backup And Recovery,8.3,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-07T16:11:22.237Z,0 CVE-2024-42024,https://securityvulnerability.io/vulnerability/CVE-2024-42024,Remote Code Execution Vulnerability in Veeam ONE Agent,"A vulnerability exists in the Veeam ONE Agent that permits an attacker with access to the service account credentials to execute arbitrary code remotely on the targeted machine. This exploitation can lead to unauthorized access and control over the affected system. Organizations utilizing Veeam ONE Agent are advised to apply recommended security measures to mitigate the risks associated with this vulnerability, ensuring that service account credentials are adequately protected.",Veeam,One,9.1,CRITICAL,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-07T16:11:22.220Z,0 CVE-2024-42022,https://securityvulnerability.io/vulnerability/CVE-2024-42022,Modification of Product Configuration Files via Incorrect Permission Assignment,"An incorrect permission assignment vulnerability has been identified in Veeam Software's Backup and Replication product, which could potentially allow an unauthorized attacker to alter critical product configuration files. This flaw may lead to unauthorized access and manipulation of backup settings, impacting the integrity and security of data management operations. It is essential for users of affected versions to evaluate their systems and implement security best practices.",Veeam,One,7.5,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-07T16:11:22.220Z,0 CVE-2024-40709,https://securityvulnerability.io/vulnerability/CVE-2024-40709,Low-Privileged User Escalation,"A missing authorization flaw in Veeam Backup & Replication software allows a local low-privileged user to escalate their privileges to root level. This vulnerability could enable unauthorized access to sensitive system functions and data, potentially compromising system integrity and security. It is crucial for users of the affected versions to assess the potential risks and apply necessary security measures.",Veeam,Backup And Recovery,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-07T16:11:22.216Z,0 CVE-2024-40713,https://securityvulnerability.io/vulnerability/CVE-2024-40713,Low-Privileged User Vulnerability Allows MFA Bypass,"A vulnerability exists within Veeam Backup & Replication that permits users with low-privileged roles to alter Multi-Factor Authentication (MFA) settings. This manipulation can enable these users to bypass the MFA mechanism, resulting in potential unauthorized access to critical backup and replication data. This highlights the importance of maintaining stringent access controls and regularly updating security measures to mitigate such risks.",Veeam,Backup And Recovery,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-07T16:11:22.216Z,0 CVE-2024-40711,https://securityvulnerability.io/vulnerability/CVE-2024-40711,Unauthenticated Remote Code Execution (RCE) Vulnerability Discovered in Vulnerability Scanning Tool,"A vulnerability has been identified in Veeam Backup & Replication products that allows for the deserialization of untrusted data. This flaw can be exploited by an attacker to execute arbitrary code remotely without authentication, potentially compromising the integrity and security of the affected systems. Proper remediation measures are necessary to mitigate the risks associated with this vulnerability.",Veeam,Backup And Recovery,9.8,CRITICAL,0.9621700048446655,true,2024-10-17T00:00:00.000Z,true,true,true,2024-09-10T16:07:37.000Z,true,true,true,2024-09-07T17:52:16.619Z,2024-09-07T16:11:22.213Z,11647 CVE-2024-39715,https://securityvulnerability.io/vulnerability/CVE-2024-39715,Remote Code Execution Vulnerability in VSPC Server via REST API,"A code injection vulnerability exists in the VSPC server by Veeam, allowing low-privileged users with access to the REST API to upload arbitrary files. This flaw could enable an attacker to execute remote code on the VSPC server, potentially compromising the system and leading to unauthorized access or data manipulation. The vulnerability underscores the risks associated with insufficient input validation and access controls in REST API implementations.",Veeam,Veeam Service Provider Console,8.5,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-07T16:11:22.204Z,0 CVE-2024-40712,https://securityvulnerability.io/vulnerability/CVE-2024-40712,Oracle Database Vulnerable to Local Privilege Escalation Attacks,"A path traversal vulnerability found in Veeam Software's Backup & Replication products enables attackers with low-privileged accounts and local access to perform local privilege escalation (LPE). This vulnerability can allow unauthorized users to access sensitive files and execute commands with elevated privileges, which poses a significant risk to system integrity and data security. Users are advised to review their systems and apply available security patches to mitigate potential exploitation. For detailed information, refer to the official documentation provided by Veeam Software.",Veeam,Backup And Recovery,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2024-09-07T16:11:22.203Z,0 CVE-2024-38651,https://securityvulnerability.io/vulnerability/CVE-2024-38651,Low-Privileged Code Execution Vulnerability Affects VSPC Servers,"A code injection vulnerability exists within the Veeam Service Provider Console (VSPC) that allows low-privileged users to overwrite files. This flaw could be exploited to achieve remote code execution on the affected server, posing a significant security risk. The vulnerability underscores the importance of promptly applying security patches and maintaining strict user privilege controls.",Veeam,Veeam Service Provider Console,8.5,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-07T16:11:22.198Z,0 CVE-2024-39714,https://securityvulnerability.io/vulnerability/CVE-2024-39714,Arbitrary File Upload Vulnerability Affects VSPC Server,"A vulnerability exists within the VSPC server that allows a low-privileged user to execute a code injection attack by uploading arbitrary files to the server. This can lead to unauthorized remote code execution, posing significant security risks for affected systems. Proper safeguards and user permission management are essential to mitigate this vulnerability and protect the integrity of the VSPC server.",Veeam,Veeam Service Provider Console,9.9,CRITICAL,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-07T16:11:22.188Z,0 CVE-2024-40710,https://securityvulnerability.io/vulnerability/CVE-2024-40710,RCE & Sensitive Data Exposure in Veeam Backup & Replication,"The identified vulnerabilities in Veeam Backup & Replication permit remote code execution (RCE) potentially allowing attackers to control affected systems. These vulnerabilities also create avenues for the extraction of sensitive information, including saved credentials and passwords. Exploitation is contingent upon the attacker having a low-privileged user role, thereby emphasizing the critical need for stringent access controls and user role management within affected environments.",Veeam,Backup And Recovery,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-07T16:11:22.182Z,0 CVE-2024-39718,https://securityvulnerability.io/vulnerability/CVE-2024-39718,Remote File Removal Vulnerability in System,"An improper input validation vulnerability exists in Veeam Backup & Replication software, allowing low-privileged users to exploit this flaw to remotely delete files on the system. The issue stems from insufficient validation of input data, leading to unauthorized actions with the same permissions as the service account. Users of affected versions are urged to review their security settings and apply necessary mitigations.",Veeam,Backup And Recovery,8.1,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-07T16:11:22.180Z,0 CVE-2024-42019,https://securityvulnerability.io/vulnerability/CVE-2024-42019,Veeam Reporter Service Vulnerability,"This vulnerability permits attackers to gain unauthorized access to the NTLM hash of the service account utilized by the Veeam Reporter Service. Exploitation of this vulnerability requires user interaction, making it essential for administrators and users of Veeam Backup & Replication to remain vigilant. Attackers can leverage data from Veeam Backup & Replication to facilitate an attack, potentially compromising sensitive credentials. Regular updates and security best practices are crucial to mitigate the risks associated with this vulnerability.",Veeam,One,9,CRITICAL,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-07T16:11:22.117Z,0 CVE-2024-29855,https://securityvulnerability.io/vulnerability/CVE-2024-29855,Veeam Recovery Orchestrator Authentication Bypass Vulnerability,"The Veeam Recovery Orchestrator Authentication Bypass Vulnerability (CVE-2024-29855) allows unauthenticated attackers to log in to the Veeam Recovery Orchestrator web UI with administrative privileges due to a hardcoded JSON Web Token (JWT) secret. A proof-of-concept (PoC) exploit for the vulnerability has been released by a security researcher, making it easier to exploit than initially suggested. The vulnerability impacts Veeam Recovery Orchestrator (VRO) versions 7.0.0.337 and 7.1.0.205 and older. It is recommended to upgrade to the patched versions 7.1.0.230 and 7.0.0.379 to mitigate the risk. Due to the availability of the exploit, attackers may attempt to leverage it against unpatched systems, emphasizing the importance of applying the available security updates as soon as possible.",Veeam,Recovery Orchestrator,9,CRITICAL,0.0004299999854993075,false,,true,false,true,2024-06-13T17:32:55.000Z,true,false,false,,2024-06-11T03:55:54.458Z,0 CVE-2024-29849,https://securityvulnerability.io/vulnerability/CVE-2024-29849,Unauthenticated Access to Veeam Backup Enterprise Manager,"An authentication bypass vulnerability has been identified in Veeam Backup Enterprise Manager, which allows unauthenticated users to log in as any user via the web interface. This flaw can potentially compromise the integrity and confidentiality of backup operations, allowing unauthorized access to sensitive data and operational controls. Organizations utilizing Veeam Backup should take immediate measures to assess their exposure and implement appropriate security protocols to mitigate risks associated with this vulnerability.",Veeam,Backup & Replication,9.8,CRITICAL,0.0004299999854993075,false,,true,false,true,2024-06-10T15:12:20.000Z,true,true,false,,2024-05-22T23:15:00.000Z,3918 CVE-2024-29851,https://securityvulnerability.io/vulnerability/CVE-2024-29851,Veeam Backup Enterprise Manager Vulnerability Allows High-Privileged Users to Steal NTLM Hash of Service Account,"A vulnerability in Veeam Backup Enterprise Manager allows users with high privileges to exploit the system and extract the NTLM hash associated with the service account. This security flaw poses a risk to data integrity and confidentiality, making it crucial for organizations using this product to assess their security posture and implement necessary mitigations. High-privileged accounts can potentially misuse this access for unauthorized purposes, which emphasizes the importance of safeguarding service accounts and monitoring user activity to prevent exploitation.",Veeam,Backup & Replication,7.2,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-05-22T23:15:00.000Z,0 CVE-2024-29850,https://securityvulnerability.io/vulnerability/CVE-2024-29850,Veeam Backup Enterprise Manager Vulnerable to Account Takeover via NTLM Relay,"The vulnerability in Veeam Backup Enterprise Manager exposes systems to potential account takeover through an NTLM relay attack. This allows an attacker to impersonate legitimate users and gain unauthorized access to sensitive backup and recovery resources. Administrators are urged to implement proper security measures, such as disabling NTLM authentication where possible and employing additional layers of security, to mitigate risks related to this vulnerability. For further details, refer to Veeam’s official knowledge base article.",Veeam,Backup & Replication,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-05-22T23:15:00.000Z,0