A vulnerability in Veeam Backup & Replication allows a low-privileged user with certain roles to perform remote code execution (RCE) by updating existing jobs. These jobs can be configured to run pre- and post-scripts, which can be located on a network share and are executed with elevated privileges by default. The user can update a job and schedule it to run almost immediately, allowing arbitrary code execution on the server.
References
History

Wed, 04 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Veeam
Veeam backup And Replication
CPEs cpe:2.3:a:veeam:backup_and_replication:*:*:*:*:*:*:*:*
Vendors & Products Veeam
Veeam backup And Replication
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 04 Dec 2024 01:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in Veeam Backup & Replication allows a low-privileged user with certain roles to perform remote code execution (RCE) by updating existing jobs. These jobs can be configured to run pre- and post-scripts, which can be located on a network share and are executed with elevated privileges by default. The user can update a job and schedule it to run almost immediately, allowing arbitrary code execution on the server.
References
Metrics cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published: 2024-12-04T01:06:04.636Z

Updated: 2024-12-04T16:38:19.691Z

Reserved: 2024-07-09T01:04:07.427Z

Link: CVE-2024-40717

cve-icon Vulnrichment

Updated: 2024-12-04T16:36:46.134Z

cve-icon NVD

Status : Received

Published: 2024-12-04T02:15:04.410

Modified: 2024-12-04T02:15:04.410

Link: CVE-2024-40717

cve-icon Redhat

No data.