Veeam’s Nightmare: Critical CVE-2024-29855 Exploit Now Public, Patch ASAP!

A critical authentication bypass vulnerability, CVE-2024-29855, in Veeam Recovery Orchestrator has a proof-of-concept exploit out in the wild. The flaw allows attackers to log in with admin privileges using a hardcoded JWT secret. Security researcher Sina Kheirkha demonstrated its ease of exploitation, urging immediate patching.

Hot Take:

Veeam Recovery Orchestrator is basically handing out admin access like Oprah hands out cars: “You get an admin token! And you get an admin token!” It’s a hacker’s dream come true, and a sysadmin’s worst nightmare. Patch now, or forever hold your… compromised data.

Key Points:

  • Critical authentication bypass vulnerability in Veeam Recovery Orchestrator tracked as CVE-2024-29855.
  • Exploit allows unauthenticated attackers to gain administrative access via hardcoded JWT secret.
  • Security researcher Sina Kheirkha released a proof-of-concept exploit, simplifying the attack process.
  • Veeam has issued patches (versions 7.1.0.230 and 7.0.0.379) to mitigate the vulnerability.
  • Attackers can bypass some of the stated exploitation conditions with relatively low effort.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here