CVE-2024-39714

9.9 CRITICAL

📋 TL;DR

This critical vulnerability allows low-privileged users to upload arbitrary files to VSPC servers, leading to remote code execution. Attackers can gain full control of affected systems. All organizations using vulnerable Veeam VSPC versions are affected.

💻 Affected Systems

Products:
  • Veeam Service Provider Console
Versions: Versions prior to 7.2.0.16180
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects VSPC installations with default configurations. Requires low-privileged user account access.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of VSPC server leading to data exfiltration, ransomware deployment, lateral movement across the network, and persistent backdoor installation.

🟠

Likely Case

Attackers gain administrative access to VSPC server, potentially compromising backup infrastructure and accessing sensitive backup data.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access, and file upload restrictions are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated low-privileged user access. The vulnerability is straightforward to exploit once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.2.0.16180

Vendor Advisory: https://www.veeam.com/kb4649

Restart Required: Yes

Instructions:

1. Download VSPC 7.2.0.16180 from Veeam website. 2. Run the installer on the VSPC server. 3. Follow upgrade wizard prompts. 4. Restart the server when prompted.

🔧 Temporary Workarounds

Restrict File Upload Permissions

windows

Temporarily restrict file upload capabilities for low-privileged users

Network Segmentation

all

Isolate VSPC server from internet and restrict internal access

🧯 If You Can't Patch

  • Implement strict network access controls to isolate VSPC server
  • Remove or restrict low-privileged user accounts and implement multi-factor authentication

🔍 How to Verify

Check if Vulnerable:

Check VSPC version in Control Panel > Programs > Veeam Service Provider Console

Check Version:

wmic product where name="Veeam Service Provider Console" get version

Verify Fix Applied:

Verify version shows 7.2.0.16180 or higher after patching

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to VSPC server
  • Suspicious process execution from upload directories
  • Authentication attempts from unexpected sources

Network Indicators:

  • Unusual outbound connections from VSPC server
  • Traffic to known malicious IPs

SIEM Query:

source="VSPC" AND (event="FileUpload" OR event="ProcessExecution")

🔗 References

📤 Share & Export