Veeam Users Urged to Update Immediately After Massive Security Flaw Discovery

Users of Veeam Backup Enterprise Manager, beware! A critical security flaw (CVE-2024-29849) could let attackers bypass authentication and log in as any user. With a CVSS score of 9.8, it’s no joke. Update to the latest version to stay safe!

Hot Take:

Looks like Veeam is playing whack-a-mole with vulnerabilities again! If Veeam was a car, it’d be in the shop more often than on the road. Make sure you update before the hackers turn your backups into backfires!

Key Points:

  • Critical flaw CVE-2024-29849 allows attackers to bypass authentication (CVSS score: 9.8).
  • Three other vulnerabilities (CVE-2024-29850, CVE-2024-29851, CVE-2024-29852) also affect Veeam Backup Enterprise Manager.
  • All issues are patched in version 12.1.2.172.
  • Other Veeam products, including Veeam Agent for Windows and Veeam Service Provider Console, have also received critical updates.
  • Veeam Backup & Replication software has been previously exploited by threat actors like FIN7 and Cuba.

Patch Your Backups or Get Whacked

Alright folks, if you’ve been napping on your updates, it’s time to wake up and smell the vulnerability coffee. Veeam’s latest issue, CVE-2024-29849, could let a sneaky attacker waltz right into your backup manager like they own the place. With a CVSS score of 9.8, this bug’s practically screaming for attention. And if that’s not enough to get your pulse racing, just think about how nice it would be to keep your data safe from cyber villains.

More Flaws Than a Reality TV Show

But wait, there’s more! Veeam didn’t stop at just one security hiccup. They’ve disclosed three additional flaws in the same product. First, there’s CVE-2024-29850, with a CVSS score of 8.8, which allows account takeover via NTLM relay. Next, CVE-2024-29851 (CVSS score: 7.2) lets a privileged user steal NTLM hashes if the service account isn’t configured correctly. And last but certainly not least, CVE-2024-29852 (CVSS score: 2.7) allows reading backup session logs. It’s like a buffet of vulnerabilities—there’s something for everyone!

Update or Face the Music

Thankfully, all these flaws have been patched in version 12.1.2.172. But remember, deploying Veeam Backup Enterprise Manager is optional. So, if you’re not using it, you’re in the clear. But if you are, you better get patching faster than a caffeine-fueled coder on a deadline. Because the only thing worse than a data breach is knowing you could have prevented it with a simple update.

Not Just One Product, But Many

Veeam’s woes don’t end with Backup Enterprise Manager. Recently, they’ve patched a local privilege escalation flaw in Veeam Agent for Windows (CVE-2024-29853, CVSS score: 7.2) and a critical remote code execution bug in Veeam Service Provider Console (CVE-2024-29212, CVSS score: 9.9). According to Veeam, the latter issue is due to an unsafe deserialization method, which sounds like a fancy way of saying “Oops, we left the backdoor wide open.”

Lessons from the Past

If history has taught us anything, it’s that Veeam software is a hot target for cybercriminals. Just ask the folks at FIN7 and Cuba, who’ve exploited previous flaws in Veeam Backup & Replication software (CVE-2023-27532, CVSS score: 7.5) to deploy all sorts of nasty payloads, including ransomware. So, unless you want to end up as the next cautionary tale, it’s time to patch those systems and keep your backups from becoming a hacker’s playground.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here