CVE-2024-40711

9.8 CRITICAL

📋 TL;DR

CVE-2024-40711 is a critical deserialization vulnerability in Veeam Backup & Replication that allows unauthenticated attackers to execute arbitrary code remotely. This affects organizations using vulnerable versions of Veeam's backup software, potentially compromising entire backup infrastructure and data.

💻 Affected Systems

Products:
  • Veeam Backup & Replication
Versions: Versions 12.1.2.172 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both Veeam Backup Enterprise Manager and Veeam Backup & Replication Console components.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to data theft, ransomware deployment, lateral movement across networks, and destruction of backup data.

🟠

Likely Case

Attackers gain initial foothold, deploy malware, exfiltrate sensitive data, and potentially disrupt backup operations.

🟢

If Mitigated

Attack attempts are blocked at network perimeter, systems remain uncompromised with minimal operational impact.

🌐 Internet-Facing: HIGH - Directly exploitable without authentication over network, making internet-exposed instances immediate targets.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems can exploit this without authentication.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available, actively exploited in the wild according to CISA's KEV catalog.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 12.1.2.172 (build 12.1.2.172)

Vendor Advisory: https://www.veeam.com/kb4649

Restart Required: Yes

Instructions:

1. Download patch from Veeam support portal. 2. Backup configuration. 3. Install patch on all affected servers. 4. Restart services. 5. Verify installation.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Veeam Backup & Replication servers to only trusted management networks.

Firewall Rules

all

Block external access to Veeam Backup & Replication ports (default 9392/TCP, 9393/TCP).

🧯 If You Can't Patch

  • Immediately isolate affected systems from internet and untrusted networks
  • Implement strict network segmentation and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check Veeam Backup & Replication version in console: Help > About. If version is 12.1.2.172 or earlier, system is vulnerable.

Check Version:

In Veeam console: Help > About displays version information

Verify Fix Applied:

Verify version shows 12.1.2.172 (build 12.1.2.172) or later in Help > About.

📡 Detection & Monitoring

Log Indicators:

  • Unusual deserialization errors in Veeam logs
  • Unexpected process creation from Veeam services
  • Authentication bypass attempts

Network Indicators:

  • Unusual connections to Veeam ports (9392/TCP, 9393/TCP) from untrusted sources
  • Malformed serialized data packets

SIEM Query:

source="veeam*" AND ("deserialization" OR "untrusted data" OR "RPC" OR "remote code")

🔗 References

📤 Share & Export