CVE-2024-42453

8.1 HIGH

📋 TL;DR

CVE-2024-42453 is a privilege escalation vulnerability in Veeam Backup & Replication that allows low-privileged users to perform unauthorized actions on connected virtual infrastructure hosts. This includes powering off VMs, deleting files, and modifying configurations, potentially causing DoS and data integrity issues. Organizations using affected Veeam Backup & Replication versions are impacted.

💻 Affected Systems

Products:
  • Veeam Backup & Replication
Versions: Versions prior to 12.1.2.172
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Requires low-privileged user access to Veeam Backup & Replication console or management services.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of virtual infrastructure with data destruction, service disruption, and potential ransomware deployment across backup systems.

🟠

Likely Case

Unauthorized VM shutdowns causing business disruption, deletion of backup files leading to data loss, and configuration changes affecting backup integrity.

🟢

If Mitigated

Limited impact with proper network segmentation and strict access controls preventing low-privileged users from reaching management services.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated low-privileged access and knowledge of vulnerable methods in management services.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.1.2.172

Vendor Advisory: https://www.veeam.com/kb4693

Restart Required: No

Instructions:

1. Download Veeam Backup & Replication 12.1.2.172 from Veeam website. 2. Run the installer on the backup server. 3. Follow upgrade wizard instructions. 4. Verify successful installation in Veeam console.

🔧 Temporary Workarounds

Restrict User Permissions

all

Temporarily remove or restrict low-privileged user access to Veeam Backup & Replication console and management services.

Network Segmentation

all

Isolate Veeam Backup & Replication management interfaces from general user networks.

🧯 If You Can't Patch

  • Implement strict role-based access control (RBAC) limiting users to minimum necessary permissions
  • Monitor and audit all configuration changes and VM operations in Veeam logs

🔍 How to Verify

Check if Vulnerable:

Check Veeam Backup & Replication version in console: Help > About. If version is below 12.1.2.172, system is vulnerable.

Check Version:

In Veeam console: Help > About displays version information

Verify Fix Applied:

Verify version shows 12.1.2.172 or higher in Help > About. Test low-privileged user cannot perform unauthorized host operations.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized configuration changes in Veeam logs
  • Unexpected VM power operations from low-privileged accounts
  • File deletion events in backup storage logs

Network Indicators:

  • Unusual management service requests from non-admin users
  • Multiple configuration modification attempts

SIEM Query:

source="veeam_logs" AND (event_type="configuration_change" OR event_type="vm_power_operation") AND user_role!="administrator"

🔗 References

📤 Share & Export