CVE-2024-42451

6.5 MEDIUM

📋 TL;DR

This vulnerability in Veeam Backup & Replication allows authenticated low-privileged users to retrieve all stored credentials in plaintext through external protocol manipulation. Attackers can exploit this to gain sensitive authentication data, potentially leading to lateral movement and unauthorized access to managed systems. Organizations using affected Veeam versions are at risk.

💻 Affected Systems

Products:
  • Veeam Backup & Replication
Versions: Versions prior to 12.1.2.172
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with low-privileged users who can access the vulnerable protocol interface are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all credentials stored in Veeam, leading to domain takeover, data exfiltration, ransomware deployment across backup infrastructure and connected systems.

🟠

Likely Case

Credential theft enabling unauthorized access to backup targets, storage systems, and managed infrastructure, potentially disrupting recovery capabilities.

🟢

If Mitigated

Limited credential exposure if strict access controls and network segmentation are implemented, though some credentials may still be compromised.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but minimal technical skill once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.1.2.172

Vendor Advisory: https://www.veeam.com/kb4693

Restart Required: Yes

Instructions:

1. Download Veeam Backup & Replication 12.1.2.172 from Veeam website. 2. Run the installer on the backup server. 3. Follow upgrade wizard. 4. Restart the backup server when prompted.

🔧 Temporary Workarounds

Restrict Protocol Access

all

Limit network access to Veeam backup server ports to only trusted administrative systems.

Configure firewall rules to restrict access to Veeam ports (typically 9392-9395, 6160-6180) to administrative IPs only.

Minimize User Privileges

windows

Review and reduce user permissions to minimum required for job functions.

Audit Veeam user roles and remove unnecessary permissions using Veeam Enterprise Manager or PowerShell: Get-VBRUser | Where-Object {$_.Role -ne 'Administrator'} | Set-VBRUser -Role 'RestoreOperator'

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Veeam backup server from general user networks
  • Enable detailed logging and monitoring for credential access attempts and implement credential rotation for all stored credentials

🔍 How to Verify

Check if Vulnerable:

Check Veeam Backup & Replication version in console: Help > About. If version is below 12.1.2.172, system is vulnerable.

Check Version:

In Veeam PowerShell: Get-VBRServerVersion | Select Version

Verify Fix Applied:

Verify version shows 12.1.2.172 or higher in Help > About, and test that low-privileged users cannot access credential retrieval functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual credential access patterns in Veeam logs
  • Multiple failed authentication attempts followed by successful credential retrieval
  • User activity outside normal business hours accessing credential-related functions

Network Indicators:

  • Unusual traffic to Veeam ports from non-administrative systems
  • External connections to Veeam backup server

SIEM Query:

source="veeam*" AND (event_id=190 OR event_id=191 OR "credential" OR "password") AND user!="SYSTEM" AND user!="Administrator"

🔗 References

📤 Share & Export