A vulnerability in Veeam Backup & Replication allows a low-privileged user to start an agent remotely in server mode and obtain credentials, effectively escalating privileges to system-level access. This allows the attacker to upload files to the server with elevated privileges. The vulnerability exists because remote calls bypass permission checks, leading to full system compromise.
References
History

Wed, 04 Dec 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Veeam
Veeam agent
Weaknesses CWE-863
CPEs cpe:2.3:a:veeam:agent:*:*:*:*:*:windows:*:*
Vendors & Products Veeam
Veeam agent
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 04 Dec 2024 01:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in Veeam Backup & Replication allows a low-privileged user to start an agent remotely in server mode and obtain credentials, effectively escalating privileges to system-level access. This allows the attacker to upload files to the server with elevated privileges. The vulnerability exists because remote calls bypass permission checks, leading to full system compromise.
References
Metrics cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published: 2024-12-04T01:06:04.654Z

Updated: 2024-12-04T16:03:26.578Z

Reserved: 2024-08-02T01:04:07.984Z

Link: CVE-2024-42452

cve-icon Vulnrichment

Updated: 2024-12-04T16:02:02.675Z

cve-icon NVD

Status : Received

Published: 2024-12-04T02:15:04.747

Modified: 2024-12-04T16:15:25.317

Link: CVE-2024-42452

cve-icon Redhat

No data.