CVE-2024-42452

8.8 HIGH

📋 TL;DR

A privilege escalation vulnerability in Veeam Backup & Replication allows authenticated low-privileged users to remotely start agents in server mode and obtain credentials, leading to system-level access and file upload capabilities. This affects organizations using Veeam Backup & Replication with multiple user accounts. Attackers can achieve full system compromise through this authentication bypass.

💻 Affected Systems

Products:
  • Veeam Backup & Replication
Versions: Versions prior to 12.2.0.334
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with multiple user accounts are vulnerable. Single-account installations may be less exposed but still vulnerable to credential theft.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary code, steal all backup data, deploy ransomware, and pivot to other systems in the environment.

🟠

Likely Case

Privilege escalation from low-privileged user to SYSTEM-level access, credential theft, and unauthorized file uploads to the backup server.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access, and monitoring are in place, though credential exposure still poses significant risk.

🌐 Internet-Facing: MEDIUM - While the vulnerability requires authentication, exposed Veeam interfaces could be targeted by attackers who obtain low-privileged credentials.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this to gain full system control and potentially compromise the entire backup infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access but the exploit chain is straightforward once initial access is obtained. No public exploit code is available as of current knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.2.0.334

Vendor Advisory: https://www.veeam.com/kb4693

Restart Required: No

Instructions:

1. Download Veeam Backup & Replication 12.2.0.334 from the official portal. 2. Run the installer with administrative privileges. 3. Follow the upgrade wizard. 4. Verify the installation completes successfully.

🔧 Temporary Workarounds

Restrict User Permissions

all

Limit low-privileged user access to only essential functions and implement strict least privilege principles.

Network Segmentation

all

Isolate Veeam Backup & Replication servers from general network access and restrict communication to authorized management systems only.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can communicate with Veeam Backup & Replication servers
  • Enable detailed logging and monitoring for suspicious authentication and privilege escalation attempts
  • Regularly rotate credentials and implement multi-factor authentication where possible
  • Conduct frequent security audits of user permissions and access patterns

🔍 How to Verify

Check if Vulnerable:

Check the Veeam Backup & Replication version in the console under Help > About. If version is below 12.2.0.334, the system is vulnerable.

Check Version:

In Veeam Backup & Replication console: Navigate to Help > About to view version information.

Verify Fix Applied:

After patching, verify the version shows 12.2.0.334 or higher in Help > About. Test that low-privileged users cannot start agents in server mode or access credential-related functions.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized attempts to start agents in server mode
  • Unexpected privilege escalation events
  • Suspicious credential access or export activities
  • Failed authentication attempts followed by successful agent startups

Network Indicators:

  • Unusual remote procedure calls to Veeam services
  • Unexpected file uploads to backup servers
  • Anomalous network traffic patterns from low-privileged accounts

SIEM Query:

source="veeam_logs" AND (event_type="agent_start" OR event_type="credential_access") AND user_privilege="low" AND result="success"

🔗 References

📤 Share & Export