CVE-2024-42457

6.5 MEDIUM

📋 TL;DR

This vulnerability in Veeam Backup & Replication allows authenticated users with operator roles to expose saved credentials by exploiting a remote management interface flaw. Attackers can add a malicious host to retrieve plaintext credentials, potentially compromising backup infrastructure and connected systems. Organizations using affected Veeam versions with operator accounts are at risk.

💻 Affected Systems

Products:
  • Veeam Backup & Replication
Versions: Versions prior to 12.2.0.334
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with operator role; affects both standalone and enterprise deployments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of backup infrastructure, credential theft leading to lateral movement across enterprise systems, and potential data exfiltration or ransomware deployment.

🟠

Likely Case

Credential theft from backup systems allowing attackers to access other systems using those credentials, potentially leading to data breaches or further system compromise.

🟢

If Mitigated

Limited impact if proper access controls, network segmentation, and credential management are in place, though credential exposure still poses risk.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once credentials are obtained; operator role access is sufficient.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.2.0.334

Vendor Advisory: https://www.veeam.com/kb4693

Restart Required: Yes

Instructions:

1. Download Veeam Backup & Replication 12.2.0.334 from Veeam website. 2. Run the installer on the backup server. 3. Follow upgrade wizard. 4. Restart services when prompted.

🔧 Temporary Workarounds

Restrict Operator Role Access

all

Limit operator role assignments to only essential personnel and implement least privilege principles.

Network Segmentation

all

Isolate Veeam management interface from untrusted networks and implement strict firewall rules.

🧯 If You Can't Patch

  • Implement strict access controls and monitor all operator account activity
  • Rotate all credentials stored in Veeam and implement multi-factor authentication where possible

🔍 How to Verify

Check if Vulnerable:

Check Veeam Backup & Replication version via console: Help > About. If version is below 12.2.0.334, system is vulnerable.

Check Version:

In Veeam console: Navigate to Help > About to view version

Verify Fix Applied:

After patching, verify version shows 12.2.0.334 or higher in Help > About.

📡 Detection & Monitoring

Log Indicators:

  • Unusual operator account activity
  • Multiple failed authentication attempts followed by successful login
  • Unexpected host additions to backup infrastructure

Network Indicators:

  • Unusual outbound connections from Veeam server
  • Traffic to unexpected IP addresses from management interface

SIEM Query:

source="veeam_logs" AND (event_type="host_addition" OR event_type="credential_access") AND user_role="operator"

🔗 References

📤 Share & Export