A vulnerability in Veeam Backup & Replication allows a low-privileged user with certain roles to perform remote code execution (RCE) by updating existing jobs. These jobs can be configured to run pre- and post-scripts, which can be located on a network share and are executed with elevated privileges by default. The user can update a job and schedule it to run almost immediately, allowing arbitrary code execution on the server.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.veeam.com/kb4693 |
History
Wed, 04 Dec 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Veeam
Veeam backup And Replication |
|
CPEs | cpe:2.3:a:veeam:backup_and_replication:*:*:*:*:*:*:*:* | |
Vendors & Products |
Veeam
Veeam backup And Replication |
|
Metrics |
ssvc
|
Wed, 04 Dec 2024 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in Veeam Backup & Replication allows a low-privileged user with certain roles to perform remote code execution (RCE) by updating existing jobs. These jobs can be configured to run pre- and post-scripts, which can be located on a network share and are executed with elevated privileges by default. The user can update a job and schedule it to run almost immediately, allowing arbitrary code execution on the server. | |
References |
| |
Metrics |
cvssV3_0
|
MITRE
Status: PUBLISHED
Assigner: hackerone
Published: 2024-12-04T01:06:04.636Z
Updated: 2024-12-04T16:38:19.691Z
Reserved: 2024-07-09T01:04:07.427Z
Link: CVE-2024-40717
Vulnrichment
Updated: 2024-12-04T16:36:46.134Z
NVD
Status : Received
Published: 2024-12-04T02:15:04.410
Modified: 2024-12-04T02:15:04.410
Link: CVE-2024-40717
Redhat
No data.