Veeam Backup Enterprise Manager Vulnerability Allows High-Privileged Users to Steal NTLM Hash of Service Account
CVE-2024-29851
7.2HIGH
Summary
A vulnerability in Veeam Backup Enterprise Manager allows users with high privileges to exploit the system and extract the NTLM hash associated with the service account. This security flaw poses a risk to data integrity and confidentiality, making it crucial for organizations using this product to assess their security posture and implement necessary mitigations. High-privileged accounts can potentially misuse this access for unauthorized purposes, which emphasizes the importance of safeguarding service accounts and monitoring user activity to prevent exploitation.
Affected Version(s)
Backup & Replication 12.1.2.172
Backup & Replication 11
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published