Unauthenticated Access to Veeam Backup Enterprise Manager

CVE-2024-29849

9.8CRITICAL

Key Information

Vendor
Veeam
Status
Backup & Replication
Vendor
CVE Published:
22 May 2024

Badges

๐Ÿ“ˆ Trended๐Ÿ“ˆ Score: 3,920๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC๐Ÿ“ฐ News Worthy

What is CVE-2024-29849?

CVE-2024-29849 is a serious vulnerability affecting Veeam Backup Enterprise Manager, a widely used solution for data backup and recovery management. This vulnerability allows unauthenticated users to gain access to the web interface of the Enterprise Manager as any user without proper authorization. Such unauthorized access can enable attackers to manipulate backup configurations, disrupt backup processes, and potentially lead to data loss or corruption, posing significant risks to organizational data integrity and availability.

Technical Details

The vulnerability arises from the improper implementation of authentication mechanisms in Veeam Backup Enterprise Manager. Attackers can exploit this flaw to bypass the typical login requirements, allowing them to access functionalities that are meant to be restricted to authorized personnel only. This exploitation does not require prior authentication, which significantly lowers the barrier to entry for potential attackers. By leveraging this vulnerability, malicious actors can interact with the system in ways that could have serious implications for an organization's backup management.

Impact of the Vulnerability

  1. Unauthorized Access: The most immediate impact of this vulnerability is the ability for unauthorized users to access sensitive operations within the Veeam Backup Enterprise Manager. This could lead to unauthorized changes to backup settings or access to sensitive backup data.

  2. Data Manipulation and Corruption: Attackers could modify backup configurations or delete essential backups, risking loss of critical business data. This level of access can undermine the organization's disaster recovery capabilities and lead to significant operational disruptions.

  3. Increased Risk of Ransomware Attacks: With the ability to access backup systems, attackers could escalate their efforts to deploy ransomware or other malicious payloads, targeting backups to ensure that organizations are forced to pay ransoms to recover their data. This vulnerability thus not only presents an immediate risk but could also contribute to broader security incidents orchestrated by organized cybercrime groups.

Affected Version(s)

Backup & Replication < 12.1.2.172

Backup & Replication < 11.0.1.1261 P20240304

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Mohamed Nabil Ali

Estimated read time 2 min read ServiceNow has patched three critical security vulnerabilities that could have allowed remote hackers to expose and access to sensitive data and execute malicious code on...

5 months ago

The Bug Bounty Hunter

The Bug Bounty Hunter Refining your HTTP perspective, with bambdashttps://portswigger.net/research/adjusting-your-http-perspective-with-bambdas PortSwigger Research Refining your HTTP perspective,...

6 months ago

Expert released PoC exploit code for Veeam Backup Enterprise Manager flaw CVE-2024-29849. Patch it now!

A proof-of-concept (PoC) exploit code for aย Veeam Backup Enterprise Manager authentication bypass flaw CVE-2024-29849 is publicly available.

7 months ago

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • ๐Ÿ“ˆ

    Vulnerability started trending

  • ๐Ÿ“ฐ

    First article discovered by The Hacker News

  • Vulnerability published

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)9 News Article(s)
.