CVE-2024-40711
📋 TL;DR
CVE-2024-40711 is a critical deserialization vulnerability in Veeam Backup & Replication that allows unauthenticated attackers to execute arbitrary code remotely. This affects organizations using vulnerable versions of Veeam's backup software, potentially compromising entire backup infrastructure and data.
💻 Affected Systems
- Veeam Backup & Replication
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise leading to data theft, ransomware deployment, lateral movement across networks, and destruction of backup data.
Likely Case
Attackers gain initial foothold, deploy malware, exfiltrate sensitive data, and potentially disrupt backup operations.
If Mitigated
Attack attempts are blocked at network perimeter, systems remain uncompromised with minimal operational impact.
🎯 Exploit Status
Public exploit code available, actively exploited in the wild according to CISA's KEV catalog.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 12.1.2.172 (build 12.1.2.172)
Vendor Advisory: https://www.veeam.com/kb4649
Restart Required: Yes
Instructions:
1. Download patch from Veeam support portal. 2. Backup configuration. 3. Install patch on all affected servers. 4. Restart services. 5. Verify installation.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to Veeam Backup & Replication servers to only trusted management networks.
Firewall Rules
allBlock external access to Veeam Backup & Replication ports (default 9392/TCP, 9393/TCP).
🧯 If You Can't Patch
- Immediately isolate affected systems from internet and untrusted networks
- Implement strict network segmentation and monitor for exploitation attempts
🔍 How to Verify
Check if Vulnerable:
Check Veeam Backup & Replication version in console: Help > About. If version is 12.1.2.172 or earlier, system is vulnerable.
Check Version:
In Veeam console: Help > About displays version information
Verify Fix Applied:
Verify version shows 12.1.2.172 (build 12.1.2.172) or later in Help > About.
📡 Detection & Monitoring
Log Indicators:
- Unusual deserialization errors in Veeam logs
- Unexpected process creation from Veeam services
- Authentication bypass attempts
Network Indicators:
- Unusual connections to Veeam ports (9392/TCP, 9393/TCP) from untrusted sources
- Malformed serialized data packets
SIEM Query:
source="veeam*" AND ("deserialization" OR "untrusted data" OR "RPC" OR "remote code")