Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Tech/Science

Veeam Warns Customers of Critical Security Vulnerability in Backup Enterprise Manager

Veeam, a prominent provider of backup and replication solutions, has issued a critical security warning to its customers regarding a vulnerability in the Veeam Backup Enterprise Manager (VBEM) that could potentially allow unauthorized access to user accounts.

VBEM serves as a web-based platform that facilitates administrators in managing Veeam Backup & Replication installations through a centralized web console. This tool is instrumental in overseeing backup operations and restoration tasks across an organization’s backup infrastructure and extensive deployments.

It is crucial to highlight that VBEM is not activated by default, and not all setups are at risk of exploitation through the identified vulnerability known as CVE-2024-29849, which has been assigned a CVSS base score of 9.8/10 by Veeam.

The security flaw in Veeam Backup Enterprise Manager could potentially enable an unauthorized individual to log into the web interface as any user, as explained by the company. To address this issue, Veeam recommends users to update to VBEM version 12.1.2.172, the version that includes the necessary patch. In cases where immediate upgrading is not feasible, users can mitigate the risk by halting and deactivating the VeeamEnterpriseManagerSvc and VeeamRESTSvc services.

For environments where VBEM is not actively utilized, an alternative approach suggested by Veeam is to uninstall the software using provided instructions to eliminate the potential attack surface.

Furthermore, Veeam has also addressed two additional high-severity vulnerabilities within VBEM. One of these vulnerabilities permits account takeover through NTLM relay (CVE-2024-29850), while the other allows high-privileged users to pilfer the NTLM hash of the Veeam Backup Enterprise Manager service account if it is not configured to operate under the default Local System account (CVE-2024-29851).

This recent warning from Veeam comes on the heels of previous security incidents involving the company’s products. In a notable instance in March 2023, Veeam patched a critical vulnerability (CVE-2023-27532) in the Backup & Replication software following reports of exploitation by threat actors associated with the FIN7 group. Subsequently, this vulnerability was leveraged in ransomware attacks attributed to various threat groups targeting critical infrastructure and IT organizations.

As part of its ongoing efforts to enhance security, Veeam has released hotfixes to address critical flaws in its ONE IT infrastructure monitoring and analytics platform. These vulnerabilities, with CVSS base scores of 9.8 and 9.9/10, could potentially allow threat actors to execute remote code and extract NTLM hashes from vulnerable servers.

Veeam’s suite of products is widely adopted, with over 450,000 customers globally, including a significant presence among the Global 2,000 companies.

LEAVE A RESPONSE

Your email address will not be published. Required fields are marked *