CVE-2024-42455

8.1 HIGH

📋 TL;DR

A vulnerability in Veeam Backup & Replication allows low-privileged authenticated users to exploit insecure deserialization via remoting services, enabling arbitrary file deletion with service account privileges. This affects organizations using vulnerable Veeam Backup & Replication installations where users have access to the application. The vulnerability stems from insufficient input validation during deserialization.

💻 Affected Systems

Products:
  • Veeam Backup & Replication
Versions: Versions prior to 12.2.0.334
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all default installations where users have access to Veeam Backup & Replication console or remoting services.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through file deletion leading to service disruption, data loss, or privilege escalation by deleting critical system files.

🟠

Likely Case

Data destruction or service disruption through targeted deletion of backup files, configuration files, or other critical application data.

🟢

If Mitigated

Limited impact if proper access controls restrict low-privileged user access to remoting services and file permissions are properly configured.

🌐 Internet-Facing: LOW (requires authenticated access to internal remoting services, typically not exposed to internet)
🏢 Internal Only: HIGH (exploitable by any authenticated low-privileged user with access to the Veeam application)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and knowledge of serialization techniques, but exploitation is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.2.0.334

Vendor Advisory: https://www.veeam.com/kb4693

Restart Required: No

Instructions:

1. Download Veeam Backup & Replication 12.2.0.334 from Veeam website. 2. Run the installer on the Veeam server. 3. Follow the upgrade wizard. 4. Verify installation completes successfully.

🔧 Temporary Workarounds

Restrict access to Veeam remoting services

Windows

Limit network access to Veeam remoting services to only trusted administrative users and systems.

Use Windows Firewall to restrict access to Veeam service ports (typically 9392/TCP, 9393/TCP)

Implement least privilege access

all

Review and restrict user permissions to only necessary functions within Veeam Backup & Replication.

Review Veeam user roles and permissions in Veeam Backup & Replication console

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Veeam servers from general user networks
  • Enable detailed logging and monitoring for file deletion events and Veeam service access

🔍 How to Verify

Check if Vulnerable:

Check Veeam Backup & Replication version in the console (Help > About) or via PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Veeam*'} | Select-Object Name, Version

Check Version:

Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Veeam Backup and Replication*'} | Select-Object Version

Verify Fix Applied:

Verify version is 12.2.0.334 or later in Veeam console or via version check command

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion events in Windows Event Logs (Event ID 4663)
  • Unexpected Veeam service connections from non-administrative users
  • Veeam remoting service access from unauthorized IPs

Network Indicators:

  • Unusual traffic to Veeam remoting ports (9392/TCP, 9393/TCP) from non-admin systems
  • Serialized data patterns in network traffic to Veeam services

SIEM Query:

source="windows" EventCode=4663 ObjectName="*.vbr" OR source="veeam" message="*deserialization*" OR message="*temporary file*"

🔗 References

📤 Share & Export