Veeam Recovery Orchestrator Authentication Bypass Vulnerability
CVE-2024-29855

9CRITICAL

Key Information:

Vendor
Veeam
Vendor
CVE Published:
11 June 2024

Badges

👾 Exploit Exists🟡 Public PoC📰 News Worthy

Summary

The Veeam Recovery Orchestrator Authentication Bypass Vulnerability (CVE-2024-29855) allows unauthenticated attackers to log in to the Veeam Recovery Orchestrator web UI with administrative privileges due to a hardcoded JSON Web Token (JWT) secret. A proof-of-concept (PoC) exploit for the vulnerability has been released by a security researcher, making it easier to exploit than initially suggested. The vulnerability impacts Veeam Recovery Orchestrator (VRO) versions 7.0.0.337 and 7.1.0.205 and older. It is recommended to upgrade to the patched versions 7.1.0.230 and 7.0.0.379 to mitigate the risk. Due to the availability of the exploit, attackers may attempt to leverage it against unpatched systems, emphasizing the importance of applying the available security updates as soon as possible.

Affected Version(s)

Recovery Orchestrator 7.1.0.230

Recovery Orchestrator 7.0.0.379

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Summoning Team

Exploiting Veeam Recovery Orchestrator Authentication Bypass CVE-2024-29855

8 months ago

Exploit for Veeam Recovery Orchestrator auth bypass available, patch now

A proof-of-concept (PoC) exploit for a critical Veeam Recovery Orchestrator authentication bypass vulnerability tracked as CVE-2024-29855 has been released, elevating the risk of being exploited in attacks.

8 months ago

WARNING: A CRITICAL VULNERABILITY AFFECTS VEEAM RECOVERY ORCHESTRATOR, PATCH IMMEDIATELY!

CVE-2024-29855: Hijacking of administrative privileges

8 months ago

References

CVSS V3.1

Score:
9
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • 📰

    First article discovered by Veeam Community

  • Vulnerability Reserved

.