Admins Beware: Veeam Exploit CVE-2024-29849 Now Public – Patch ASAP!

Admins, brace yourselves! A proof-of-concept exploit for the Veeam Backup Enterprise Manager authentication bypass flaw CVE-2024-29849 is now out in the wild. Urgent action is needed: upgrade to version 12.1.2.172 or follow mitigation steps to avoid potential cyber mishaps.

Hot Take:

Well, it looks like Veeam’s backup plan just got a little more ‘exciting’! Who knew backing up your data could come with an adrenaline rush? Time to patch up those digital lifeboats before your backups backfire!

Key Points:

  • Public exploit for Veeam Backup Enterprise Manager (VBEM) flaw CVE-2024-29849 now available.
  • Critical vulnerability allows remote unauthenticated attackers to log in as any user.
  • Vulnerability lies in the ‘Veeam.Backup.Enterprise.RestAPIService.exe’ service on TCP port 9398.
  • Admins urged to update to VBEM version 12.1.2.172 ASAP.
  • Mitigation tips provided for those unable to update immediately.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here