Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
12 résultats taggé veeam  ✕
KB4743: Vulnerabilities Resolved in Veeam Backup & Replication 12.3.2 https://www.veeam.com/kb4743
18/06/2025 09:23:24
QRCode
archive.org
thumbnail

Issue Details
CVE-2025-23121

A vulnerability allowing remote code execution (RCE) on the Backup Server by an authenticated domain user.

Severity: Critical
CVSS v3.0 Score: 9.9
Source: Reported by watchTowr and CodeWhite.
Note: This vulnerability only impacts domain-joined backup servers.
Veeam Backup & Replication Security Best Practice Guide > Workgroup or Domain?
Affected Product

Veeam Backup & Replication 12.3.1.1139 and all earlier version 12 builds.
Note: Unsupported product versions are not tested, but are likely affected and should be considered vulnerable.
Solution

This vulnerability was fixed starting in the following build:

Veeam Backup & Replication 12.3.2 (build 12.3.2.3617)

CVE-2025-24286

A vulnerability allowing an authenticated user with the Backup Operator role to modify backup jobs, which could execute arbitrary code.

Severity: High
CVSS v3.1 Score: 7.2
Source: Reported by Nikolai Skliarenko with Trend Micro.
Affected Product

Veeam Backup & Replication 12.3.1.1139 and all earlier version 12 builds.
Note: Unsupported product versions are not tested, but are likely affected and should be considered vulnerable.
Solution

This vulnerability was fixed starting in the following build:

Veeam Backup & Replication 12.3.2 (build 12.3.2.3617)

CVE-2025-24287

A vulnerability allowing local system users to modify directory contents, allowing for arbitrary code execution on the local system with elevated permissions.

Severity: Medium
CVSS v3.1 Score: 6.1
Source: Reported by CrisprXiang working with Trend Micro Zero Day Initiative.
Affected Product

Veeam Agent for Microsoft Windows 6.3.1.1074 and all earlier version 6 builds.
Note: Unsupported product versions are not tested, but are likely affected and should be considered vulnerable.
Solution

This vulnerability was fixed starting in the following build:

Veeam Agent for Microsoft Windows 6.3.2 (build 6.3.2.1205)
Veeam Agent for Microsoft Windows is included with Veeam Backup & Replication and available as a standalone application.
veeam EN 2025 Security-Bulletin vulnerability CVE-2025-23121 CVE-2025-24287 CVE-2025-24286
Critical Veeam Backup & Replication CVE-2025-23120 https://www.rapid7.com/blog/post/2025/03/19/etr-critical-veeam-backup-and-replication-cve-2025-23120/
20/03/2025 08:27:02
QRCode
archive.org
thumbnail

On Wednesday, March 19, 2025, backup and recovery software provider Veeam published a security advisory for a critical remote code execution vulnerability tracked as CVE-2025-23120. The vulnerability affects Backup & Replication systems that are domain joined. Veeam explicitly mentions that domain-joined backup servers are against security and compliance best practices, but in reality, we believe this is likely to be a relatively common configuration

rapid7 EN 2025 Replication CVE-2025-23120 vulnerabilty Veeam
Veeam warns of critical RCE bug in Service Provider Console https://www.bleepingcomputer.com/news/security/veeam-warns-of-critical-rce-bug-in-service-provider-console/
07/12/2024 09:55:40
QRCode
archive.org
thumbnail

​Veeam released security updates today to address two Service Provider Console (VSPC) vulnerabilities, including a critical remote code execution (RCE) discovered during internal testing.

VSPC, described by the company as a remote-managed BaaS (Backend as a Service) and DRaaS (Disaster Recovery as a Service) platform, is used by service providers to monitor the health and security of customer backups, as well as manage their Veeam-protected virtual, Microsoft 365, and public cloud workloads.

bleepingcomputer EN 2024 RCE bug DRaaS VSPC Veeam
VEEAM exploit seen used again with a new ransomware: “Frag https://news.sophos.com/en-us/2024/11/08/veeam-exploit-seen-used-again-with-a-new-ransomware-frag/
11/11/2024 22:39:33
QRCode
archive.org
thumbnail

Last month, Sophos X-Ops reported several MDR cases where threat actors exploited a vulnerability in Veeam backup servers. We continue to track the activities of this threat cluster, which recently…

sophos EN 2024 VEEAM ransomware Frag CVE-2024-40711
Veeam Backup & Response - RCE With Auth, But Mostly Without Auth (CVE-2024-40711) https://labs.watchtowr.com/veeam-backup-response-rce-with-auth-but-mostly-without-auth-cve-2024-40711-2/
09/09/2024 22:08:37
QRCode
archive.org
thumbnail

Every sysadmin is familiar with Veeam’s enterprise-oriented backup solution, ‘Veeam Backup & Replication’. Unfortunately, so is every ransomware operator, given it's somewhat 'privileged position' in the storage world of most enterprise's networks. There's no point deploying cryptolocker malware on a target unless you can also deny access to backups, and so, this class of attackers absolutely loves to break this particular software.
With so many eyes focussed on it, then, it is no huge surprise that it has a rich history of CVEs. Today, we're going to look at the latest episode - CVE-2024-40711.
Well, that was a complex vulnerability, requiring a lot of code-reading! We’ve successfully shown how multiple bugs can be chained together to gain RCE in a variety of versions of Veeam Backup & Replication.

watchtowr EN 2024 EN Veeam CVE-2024-40711 analysis PoC
Veeam warns of critical RCE flaw in Backup & Replication software https://www.bleepingcomputer.com/news/security/veeam-warns-of-critical-rce-flaw-in-backup-and-replication-software/
06/09/2024 11:23:28
QRCode
archive.org
thumbnail

Veeam has released security updates for several of its products as part of a single September 2024 security bulletin that addresses 18 high and critical severity flaws in Veeam Backup & Replication, Service Provider Console, and One.

bleepingcomputer EN 2024 RCE Remote-Code-Execution Veeam Veeam-Backup-&-Replication Veeam-ONE Vulnerability
Patch or Peril: A Veeam vulnerability incident https://www.group-ib.com/blog/estate-ransomware/
12/07/2024 22:21:57
QRCode
archive.org

Delaying security updates and neglecting regular reviews created vulnerabilities that were exploited by attackers, resulting in severe ransomware consequences.

  • Initial access via FortiGate Firewall SSL VPN using a dormant account
  • Deployed persistent backdoor (“svchost.exe”) on the failover server, and conducted lateral movement via RDP.
  • Exploitation attempts of CVE-2023-27532 was followed by activation of xp_cmdshell and rogue user account creation.
  • Threat actors made use of NetScan, AdFind, and various tools provided by NirSoft to conduct network discovery, enumeration, and credential harvesting.
  • Windows Defender was permanently disabled using DC.exe, followed by ransomware deployment and execution with PsExec.exe.
group-ib EN 2024 Veeam vulnerability incident ransomware FortiGate NirSoft
Bypassing Veeam Authentication CVE-2024-29849 https://summoning.team/blog/veeam-enterprise-manager-cve-2024-29849-auth-bypass/
11/06/2024 16:31:43
QRCode
archive.org
thumbnail

Veeam Backup Enterprise Manager Authentication Bypass

summoning.team EN 2024 Veeam Backup Enterprise Manager Authentication Bypass PoC CVE-2024-29849
CVE-2023-27532 https://attackerkb.com/topics/ALUsuJioE5/cve-2023-27532/rapid7-analysis
08/01/2024 09:10:00
QRCode
archive.org
thumbnail

Veeam Backup & Replication is a data backup and replication solution. On March 7, 2023, Veeam published an advisory, along with patches, for https://nvd.nist.g…

AttackerKB EN 2023 Veeam CVE-2023-27532 analysis
CVE-2023-38548 https://attackerkb.com/topics/UPt5tpYK2Y/cve-2023-38548/rapid7-analysis?
10/11/2023 21:28:37
QRCode
archive.org
thumbnail

On November 6, 2023, Veeam published an advisory for several vulnerabilities affecting Veeam ONE, an IT monitoring and analytics platform for enterprises. One …

attackerkb CVE-2023-38548 EN 2023 VeeamONE Veeam vulnerability
FIN7 tradecraft seen in attacks against Veeam backup servers https://labs.withsecure.com/publications/fin7-target-veeam-servers
01/05/2023 21:23:43
QRCode
archive.org
thumbnail

WithSecure Intelligence identified attacks which occurred in late March 2023 against internet-facing servers running Veeam Backup & Replication software. Our research indicates that the intrusion set used in these attacks has overlaps with those attributed to the FIN7 activity group. It is likely that initial access & execution was achieved through a recently patched Veeam Backup & Replication vulnerability, CVE-2023-27532.

withsecure EN 2023 Research Veeam FIN7
CVE-2023-27532 https://www.veeam.com/kb4424?s=09
08/03/2023 19:14:41
QRCode
archive.org
thumbnail

Vulnerability CVE-2023-27532 in a Veeam Backup & Replication component allows an unauthenticated user operating within the backup infrastructure network perimeter to obtain encrypted credentials stored in the configuration database. This may lead to an attacker gaining access to the backup infrastructure hosts.

veeam EN 2023 advisory vulnerability Backup
4472 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio