DLL injection in Veeam Agent for Windows can occur if the system's PATH variable includes insecure locations. When the agent runs, it searches these directories for necessary DLLs. If an attacker places a malicious DLL in one of these directories, the Veeam Agent might load it inadvertently, allowing the attacker to execute harmful code. This could lead to unauthorized access, data theft, or disruption of services
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.veeam.com/kb4693 |
History
Wed, 04 Dec 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Veeam
Veeam agent |
|
Weaknesses | CWE-426 | |
CPEs | cpe:2.3:a:veeam:agent:*:*:*:*:*:windows:*:* | |
Vendors & Products |
Veeam
Veeam agent |
|
Metrics |
ssvc
|
Wed, 04 Dec 2024 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | DLL injection in Veeam Agent for Windows can occur if the system's PATH variable includes insecure locations. When the agent runs, it searches these directories for necessary DLLs. If an attacker places a malicious DLL in one of these directories, the Veeam Agent might load it inadvertently, allowing the attacker to execute harmful code. This could lead to unauthorized access, data theft, or disruption of services | |
References |
| |
Metrics |
cvssV3_0
|
MITRE
Status: PUBLISHED
Assigner: hackerone
Published: 2024-12-04T01:06:04.660Z
Updated: 2024-12-04T15:21:30.380Z
Reserved: 2024-08-23T01:00:01.061Z
Link: CVE-2024-45207
Vulnrichment
Updated: 2024-12-04T15:02:23.537Z
NVD
Status : Received
Published: 2024-12-04T02:15:05.520
Modified: 2024-12-04T16:15:25.580
Link: CVE-2024-45207
Redhat
No data.