CVE-2024-29849

9.8 CRITICAL

📋 TL;DR

CVE-2024-29849 is an authentication bypass vulnerability in Veeam Backup Enterprise Manager that allows unauthenticated attackers to log into the web interface as any user. This affects organizations using Veeam Backup Enterprise Manager for centralized backup management. The vulnerability requires no credentials or special access to exploit.

💻 Affected Systems

Products:
  • Veeam Backup Enterprise Manager
Versions: All versions prior to the fix
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all default installations of Veeam Backup Enterprise Manager. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative access to backup infrastructure, allowing them to delete, modify, or exfiltrate backup data, disable backup jobs, and potentially compromise connected systems.

🟠

Likely Case

Attackers access sensitive backup data, modify backup configurations, disrupt backup operations, and potentially use the compromised system as a foothold for lateral movement.

🟢

If Mitigated

Limited impact if system is isolated, has strict network controls, and monitoring detects unauthorized access attempts quickly.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation makes internet-facing instances extremely vulnerable to mass scanning and automated attacks.
🏢 Internal Only: HIGH - Even internal systems are vulnerable to any network-accessible attacker, including compromised endpoints or malicious insiders.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request manipulation can bypass authentication. Public proof-of-concept code is available, making exploitation trivial.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Veeam KB4581 for specific patched versions

Vendor Advisory: https://veeam.com/kb4581

Restart Required: Yes

Instructions:

1. Download the latest patch from Veeam's official website. 2. Apply the patch following Veeam's installation instructions. 3. Restart the Veeam Backup Enterprise Manager service. 4. Verify the patch is applied successfully.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to Veeam Backup Enterprise Manager to only trusted management networks

Use firewall rules to block all external access to port 9392/TCP (default Veeam port)

IP Restriction

windows

Configure web server to only allow connections from specific IP addresses

Configure IIS/IP restrictions to allow only authorized management IPs

🧯 If You Can't Patch

  • Immediately isolate the system from all untrusted networks including internet
  • Implement strict network segmentation and monitor all access attempts to the Veeam interface

🔍 How to Verify

Check if Vulnerable:

Attempt unauthenticated login to the Veeam Backup Enterprise Manager web interface. If login succeeds without credentials, system is vulnerable.

Check Version:

Check Veeam Backup Enterprise Manager version in the web interface or via Veeam console

Verify Fix Applied:

After patching, attempt unauthenticated login - it should fail with proper authentication required.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated login attempts in Veeam logs
  • Successful logins from unexpected IP addresses
  • Multiple failed login attempts followed by successful login

Network Indicators:

  • HTTP requests to login endpoint without authentication headers
  • Unusual traffic patterns to port 9392

SIEM Query:

source="veeam_logs" AND (event="login" AND (user="*" OR auth_method="none"))

🔗 References

📤 Share & Export