CVE-2024-42456
📋 TL;DR
This vulnerability in Veeam Backup & Replication allows low-privileged users with specific roles to modify critical configuration settings, including trusted client certificates used for authentication. This can lead to unauthorized access and privilege escalation, enabling attackers to execute privileged operations and critical services. Organizations using affected Veeam Backup & Replication versions are at risk.
💻 Affected Systems
- Veeam Backup & Replication
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain administrative control over the backup infrastructure, potentially compromising all backup data, deploying ransomware, or using the system as a pivot point to attack other systems.
Likely Case
Unauthorized users modify authentication certificates to gain elevated privileges, potentially accessing sensitive backup data or disrupting backup operations.
If Mitigated
With proper role-based access controls and network segmentation, impact is limited to isolated backup components without affecting production systems.
🎯 Exploit Status
Exploitation requires authenticated access with specific low-privileged roles. Attackers need knowledge of the vulnerable method and target configuration.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: As specified in Veeam KB4693 (typically latest cumulative patch)
Vendor Advisory: https://www.veeam.com/kb4693
Restart Required: No
Instructions:
1. Review Veeam KB4693 for specific patch version. 2. Download the patch from Veeam's official portal. 3. Apply the patch following Veeam's installation guide. 4. Verify patch installation through Veeam console.
🔧 Temporary Workarounds
Restrict Role Permissions
allReview and modify role-based access controls to ensure low-privileged users cannot access configuration modification methods.
Network Segmentation
allIsolate Veeam Backup & Replication servers from general user networks to limit access to authorized administrators only.
🧯 If You Can't Patch
- Implement strict role-based access controls and audit all user permissions regularly.
- Monitor for suspicious configuration changes and certificate modifications in Veeam logs.
🔍 How to Verify
Check if Vulnerable:
Check Veeam Backup & Replication version against affected versions listed in KB4693. Review user role permissions for configuration modification capabilities.
Check Version:
In Veeam Backup & Replication console: Help → About, or check Windows Programs and Features for installed version.
Verify Fix Applied:
Verify installed patch version matches or exceeds the fixed version in KB4693. Test that low-privileged users can no longer modify critical configuration settings.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized configuration changes in Veeam logs
- Certificate modification events
- Privilege escalation attempts
Network Indicators:
- Unusual authentication attempts to Veeam services
- Unexpected certificate changes on backup ports
SIEM Query:
source="veeam_logs" AND (event_type="configuration_change" OR certificate_modification="true")