Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:veeam:one:11.0.0.1379:*:*:*:*:*:*:*", "matchCriteriaId": "8D1ECDF8-4BAB-4E77-A409-EB5065AB916D", "vulnerable": true}, {"criteria": "cpe:2.3:a:veeam:one:11.0.1.1880:*:*:*:*:*:*:*", "matchCriteriaId": "CD967DF5-1470-43EF-9465-A2E464F30F88", "vulnerable": true}, {"criteria": "cpe:2.3:a:veeam:one:12.0.0.2498:*:*:*:*:*:*:*", "matchCriteriaId": "D1C9B702-1613-4570-B9CB-5BF3F7F6B732", "vulnerable": true}, {"criteria": "cpe:2.3:a:veeam:one:12.0.1.2591:*:*:*:*:*:*:*", "matchCriteriaId": "B1FB1ABE-0179-400B-8EFD-7F84A51B64C8", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in Veeam ONE allows an unprivileged user who has access to the Veeam ONE Web Client the ability to acquire the NTLM hash of the account used by the Veeam ONE Reporting Service. Note: The criticality of this vulnerability is reduced as it requires interaction by a user with the Veeam ONE Administrator role."}, {"lang": "es", "value": "Una vulnerabilidad en Veeam ONE permite a un usuario sin privilegios que tiene acceso al cliente web Veeam ONE la capacidad de adquirir el hash NTLM de la cuenta utilizada por Veeam ONE Reporting Service. Nota: La criticidad de esta vulnerabilidad se reduce ya que requiere la interacci\u00f3n de un usuario con el rol de administrador de Veeam ONE."}], "id": "CVE-2023-38549", "lastModified": "2024-11-21T08:13:48.593", "metrics": {"cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", "version": "3.0"}, "exploitabilityScore": 0.9, "impactScore": 3.6, "source": "support@hackerone.com", "type": "Secondary"}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2023-11-07T07:15:09.187", "references": [{"source": "support@hackerone.com", "tags": ["Patch", "Vendor Advisory"], "url": "https://www.veeam.com/kb4508"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "https://www.veeam.com/kb4508"}], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}