CVE-2024-38650

9.9 CRITICAL

📋 TL;DR

This authentication bypass vulnerability allows low-privileged attackers to access NTLM hashes of service accounts on VSPC servers. Attackers could use these hashes for pass-the-hash attacks or credential theft. Organizations running affected Veeam VSPC versions are impacted.

💻 Affected Systems

Products:
  • Veeam Service Provider Console
Versions: All versions prior to 8.0.0.2621
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects VSPC installations with default configurations; requires attacker to have some level of authenticated access initially.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of VSPC server leading to lateral movement across the network, domain escalation, and potential ransomware deployment.

🟠

Likely Case

Service account credential theft enabling unauthorized access to backup infrastructure and potential data exfiltration.

🟢

If Mitigated

Limited to isolated VSPC server compromise if proper network segmentation and privileged account management are implemented.

🌐 Internet-Facing: HIGH if VSPC is exposed to internet, as authentication bypass could be exploited remotely.
🏢 Internal Only: HIGH due to potential for lateral movement and domain compromise even from internal network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated low-privilege access but exploitation is straightforward once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.0.0.2621

Vendor Advisory: https://www.veeam.com/kb4649

Restart Required: Yes

Instructions:

1. Download VSPC 8.0.0.2621 from Veeam website. 2. Backup current configuration. 3. Run installer with administrative privileges. 4. Restart VSPC services as prompted.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate VSPC server from general network access and restrict to backup administrators only.

Privileged Account Management

all

Implement Just-In-Time access and monitor service account usage.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach VSPC server
  • Enable detailed logging and monitoring for unusual authentication attempts or hash extraction activities

🔍 How to Verify

Check if Vulnerable:

Check VSPC version in web interface or via PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Veeam Service Provider Console*'}

Check Version:

Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Veeam Service Provider Console*'} | Select-Object Name, Version

Verify Fix Applied:

Confirm version is 8.0.0.2621 or higher using same command and verify no authentication bypass attempts in logs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns
  • Multiple failed login attempts followed by successful low-privilege access
  • Unexpected service account hash retrieval

Network Indicators:

  • Unusual outbound connections from VSPC server
  • SMB/NTLM traffic patterns indicative of pass-the-hash

SIEM Query:

source="veeam_vspc" AND (event_type="authentication" AND result="success" AND user_privilege="low") OR (event_type="credential_access" AND method="hash_extraction")

🔗 References

📤 Share & Export