CVE-2024-45206

6.5 MEDIUM

📋 TL;DR

This vulnerability in Veeam Service Provider Console allows attackers to make arbitrary HTTP requests to internal network resources, potentially exposing sensitive information about internal systems. It affects organizations using Veeam Service Provider Console with vulnerable versions. The vulnerability enables server-side request forgery (SSRF) attacks.

💻 Affected Systems

Products:
  • Veeam Service Provider Console
Versions: Versions prior to the fix in KB4649
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Veeam Service Provider Console installations that are accessible to attackers, particularly internet-facing instances.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive internal systems, retrieve credentials, pivot to other network segments, and potentially achieve remote code execution on internal services.

🟠

Likely Case

Information disclosure about internal network resources, enumeration of internal services, and potential data exfiltration from internal systems.

🟢

If Mitigated

Limited to information gathering about internal network structure with no direct access to sensitive data if proper network segmentation and authentication controls are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to the vulnerable service but appears to be straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version with fix referenced in KB4649

Vendor Advisory: https://www.veeam.com/kb4649

Restart Required: Yes

Instructions:

1. Download the patch from Veeam KB4649. 2. Apply the patch to all affected Veeam Service Provider Console installations. 3. Restart the Veeam Service Provider Console service. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Veeam Service Provider Console to trusted IP addresses only

Use firewall rules to limit access to specific management IPs

Authentication Enforcement

all

Ensure strong authentication is required for all console access

Configure multi-factor authentication if available

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the Veeam Service Provider Console
  • Monitor for unusual outbound HTTP requests from the Veeam console to internal resources

🔍 How to Verify

Check if Vulnerable:

Check Veeam Service Provider Console version against the patched version in KB4649

Check Version:

Check Veeam Service Provider Console version in the application interface or installation directory

Verify Fix Applied:

Verify the version has been updated to the patched version and test that arbitrary HTTP requests to internal resources are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests originating from Veeam Service Provider Console to internal resources
  • Multiple failed authentication attempts followed by HTTP requests

Network Indicators:

  • HTTP traffic from Veeam console to unexpected internal IP addresses or services
  • Pattern of requests to internal metadata services or management interfaces

SIEM Query:

source="veeam-console" AND (dest_ip=~"10.*" OR dest_ip=~"192.168.*" OR dest_ip=~"172.16.*") AND protocol="HTTP"

🔗 References

📤 Share & Export