CVE-2024-42448

9.9 CRITICAL

📋 TL;DR

This critical vulnerability allows an attacker with access to a VSPC management agent machine to execute arbitrary code on the VSPC server, potentially taking full control of the server. It affects Veeam Service Provider Console installations where management agents are authorized on the server. The CVSS 9.9 score indicates near-maximum severity.

💻 Affected Systems

Products:
  • Veeam Service Provider Console
Versions: All versions prior to 7.0.2.1541
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires management agent authorization on the server, which is a common configuration in VSPC deployments.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the VSPC server, allowing attacker to steal all managed backup data, deploy ransomware across managed environments, and pivot to other systems in the infrastructure.

🟠

Likely Case

Attacker gains administrative control of the VSPC server, enabling them to access backup repositories, modify backup jobs, and potentially access credentials for managed systems.

🟢

If Mitigated

With proper network segmentation and strict access controls, impact is limited to the VSPC server itself, though this still represents significant risk to backup integrity.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to a management agent machine that is authorized on the server, but once this condition is met, the RCE is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.0.2.1541

Vendor Advisory: https://www.veeam.com/kb4679

Restart Required: Yes

Instructions:

1. Download VSPC 7.0.2.1541 from Veeam's website. 2. Run the installer on the VSPC server. 3. Follow the upgrade wizard. 4. Restart the VSPC server after installation completes.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate VSPC management agent machines from the VSPC server using firewall rules to prevent unauthorized access.

Restrict Management Agent Access

windows

Review and minimize which management agents are authorized on the VSPC server to reduce attack surface.

🧯 If You Can't Patch

  • Implement strict network segmentation between management agent machines and the VSPC server
  • Apply principle of least privilege to management agent access and monitor for unauthorized connections

🔍 How to Verify

Check if Vulnerable:

Check VSPC version in the console under Help > About. If version is below 7.0.2.1541, the system is vulnerable.

Check Version:

Not applicable - use GUI method above

Verify Fix Applied:

After patching, verify the version shows 7.0.2.1541 or higher in Help > About.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation events on VSPC server
  • Suspicious network connections from management agent machines to VSPC server

Network Indicators:

  • Unexpected RPC/DCOM traffic between management agents and VSPC server
  • Anomalous outbound connections from VSPC server

SIEM Query:

source="VSPC" AND (event_id="4688" OR process_name="cmd.exe" OR process_name="powershell.exe") AND parent_process="Veeam.VSPC.Service"

🔗 References

📤 Share & Export