A vulnerability in Veeam Backup & Replication allows a low-privileged user to start an agent remotely in server mode and obtain credentials, effectively escalating privileges to system-level access. This allows the attacker to upload files to the server with elevated privileges. The vulnerability exists because remote calls bypass permission checks, leading to full system compromise.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.veeam.com/kb4693 |
History
Wed, 04 Dec 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Veeam
Veeam agent |
|
Weaknesses | CWE-863 | |
CPEs | cpe:2.3:a:veeam:agent:*:*:*:*:*:windows:*:* | |
Vendors & Products |
Veeam
Veeam agent |
|
Metrics |
ssvc
|
Wed, 04 Dec 2024 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in Veeam Backup & Replication allows a low-privileged user to start an agent remotely in server mode and obtain credentials, effectively escalating privileges to system-level access. This allows the attacker to upload files to the server with elevated privileges. The vulnerability exists because remote calls bypass permission checks, leading to full system compromise. | |
References |
| |
Metrics |
cvssV3_0
|
MITRE
Status: PUBLISHED
Assigner: hackerone
Published: 2024-12-04T01:06:04.654Z
Updated: 2024-12-04T16:03:26.578Z
Reserved: 2024-08-02T01:04:07.984Z
Link: CVE-2024-42452
Vulnrichment
Updated: 2024-12-04T16:02:02.675Z
NVD
Status : Received
Published: 2024-12-04T02:15:04.747
Modified: 2024-12-04T16:15:25.317
Link: CVE-2024-42452
Redhat
No data.