CVE-2024-42456

8.8 HIGH

📋 TL;DR

This vulnerability in Veeam Backup & Replication allows low-privileged users with specific roles to modify critical configuration settings, including trusted client certificates used for authentication. This can lead to unauthorized access and privilege escalation, enabling attackers to execute privileged operations and critical services. Organizations using affected Veeam Backup & Replication versions are at risk.

💻 Affected Systems

Products:
  • Veeam Backup & Replication
Versions: Specific versions as detailed in Veeam KB4693 (typically versions before the patch)
Operating Systems: Windows Server (where Veeam Backup & Replication is installed)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires low-privileged user with specific role access to the Veeam Backup & Replication console or API.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative control over the backup infrastructure, potentially compromising all backup data, deploying ransomware, or using the system as a pivot point to attack other systems.

🟠

Likely Case

Unauthorized users modify authentication certificates to gain elevated privileges, potentially accessing sensitive backup data or disrupting backup operations.

🟢

If Mitigated

With proper role-based access controls and network segmentation, impact is limited to isolated backup components without affecting production systems.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access with specific low-privileged roles. Attackers need knowledge of the vulnerable method and target configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: As specified in Veeam KB4693 (typically latest cumulative patch)

Vendor Advisory: https://www.veeam.com/kb4693

Restart Required: No

Instructions:

1. Review Veeam KB4693 for specific patch version. 2. Download the patch from Veeam's official portal. 3. Apply the patch following Veeam's installation guide. 4. Verify patch installation through Veeam console.

🔧 Temporary Workarounds

Restrict Role Permissions

all

Review and modify role-based access controls to ensure low-privileged users cannot access configuration modification methods.

Network Segmentation

all

Isolate Veeam Backup & Replication servers from general user networks to limit access to authorized administrators only.

🧯 If You Can't Patch

  • Implement strict role-based access controls and audit all user permissions regularly.
  • Monitor for suspicious configuration changes and certificate modifications in Veeam logs.

🔍 How to Verify

Check if Vulnerable:

Check Veeam Backup & Replication version against affected versions listed in KB4693. Review user role permissions for configuration modification capabilities.

Check Version:

In Veeam Backup & Replication console: Help → About, or check Windows Programs and Features for installed version.

Verify Fix Applied:

Verify installed patch version matches or exceeds the fixed version in KB4693. Test that low-privileged users can no longer modify critical configuration settings.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized configuration changes in Veeam logs
  • Certificate modification events
  • Privilege escalation attempts

Network Indicators:

  • Unusual authentication attempts to Veeam services
  • Unexpected certificate changes on backup ports

SIEM Query:

source="veeam_logs" AND (event_type="configuration_change" OR certificate_modification="true")

🔗 References

📤 Share & Export