CVE-2023-38547

9.8 CRITICAL

📋 TL;DR

This vulnerability in Veeam ONE allows unauthenticated attackers to obtain SQL server connection details for the configuration database. This information disclosure could lead to remote code execution on the SQL server hosting the Veeam ONE database. All Veeam ONE installations are affected.

💻 Affected Systems

Products:
  • Veeam ONE
Versions: All versions prior to 12.0.0.1420 P20230718
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. Requires Veeam ONE web interface to be accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of the SQL server hosting Veeam ONE configuration database, potentially leading to domain-wide compromise if SQL server has elevated privileges.

🟠

Likely Case

SQL server compromise leading to data exfiltration, credential theft, and lateral movement within the network.

🟢

If Mitigated

Limited to information disclosure about SQL connection strings without ability to exploit further due to network segmentation and access controls.

🌐 Internet-Facing: HIGH - Unauthenticated exploitation means any internet-facing Veeam ONE instance is immediately vulnerable.
🏢 Internal Only: HIGH - Even internal-only instances are vulnerable to any network-accessible attacker.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated access makes exploitation trivial once SQL connection details are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.0.0.1420 P20230718

Vendor Advisory: https://www.veeam.com/kb4508

Restart Required: Yes

Instructions:

1. Download Veeam ONE 12.0.0.1420 P20230718 from Veeam website. 2. Run installer on Veeam ONE server. 3. Follow upgrade wizard. 4. Restart Veeam ONE services when prompted.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Veeam ONE web interface to only trusted administrative networks.

Firewall Rules

all

Block external access to Veeam ONE ports (default 1239, 1240) at perimeter firewall.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Veeam ONE server from SQL server and other critical systems
  • Monitor for unusual SQL connection attempts and review SQL server logs for unauthorized access

🔍 How to Verify

Check if Vulnerable:

Check Veeam ONE version in web interface or via 'Get-VBRServerVersion' PowerShell command. If version is below 12.0.0.1420 P20230718, system is vulnerable.

Check Version:

Get-VBRServerVersion (PowerShell) or check Help > About in Veeam ONE web interface

Verify Fix Applied:

Verify version is 12.0.0.1420 P20230718 or later using same methods. Test that unauthenticated requests to vulnerable endpoints no longer return SQL connection information.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated requests to Veeam ONE web interface endpoints
  • Unusual SQL connection attempts from Veeam ONE server IP

Network Indicators:

  • Unusual traffic patterns to Veeam ONE ports from unauthorized sources
  • SQL connection attempts from unexpected IPs

SIEM Query:

source="veeam_logs" AND (http_status=200 AND uri_path="/api/*" AND user_agent NOT IN authorized_agents)

🔗 References

📤 Share & Export