CVE-2024-45206
📋 TL;DR
This vulnerability in Veeam Service Provider Console allows attackers to make arbitrary HTTP requests to internal network resources, potentially exposing sensitive information about internal systems. It affects organizations using Veeam Service Provider Console with vulnerable versions. The vulnerability enables server-side request forgery (SSRF) attacks.
💻 Affected Systems
- Veeam Service Provider Console
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access sensitive internal systems, retrieve credentials, pivot to other network segments, and potentially achieve remote code execution on internal services.
Likely Case
Information disclosure about internal network resources, enumeration of internal services, and potential data exfiltration from internal systems.
If Mitigated
Limited to information gathering about internal network structure with no direct access to sensitive data if proper network segmentation and authentication controls are in place.
🎯 Exploit Status
Exploitation requires network access to the vulnerable service but appears to be straightforward once access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version with fix referenced in KB4649
Vendor Advisory: https://www.veeam.com/kb4649
Restart Required: Yes
Instructions:
1. Download the patch from Veeam KB4649. 2. Apply the patch to all affected Veeam Service Provider Console installations. 3. Restart the Veeam Service Provider Console service. 4. Verify the fix is applied.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to Veeam Service Provider Console to trusted IP addresses only
Use firewall rules to limit access to specific management IPs
Authentication Enforcement
allEnsure strong authentication is required for all console access
Configure multi-factor authentication if available
🧯 If You Can't Patch
- Implement strict network access controls to limit who can reach the Veeam Service Provider Console
- Monitor for unusual outbound HTTP requests from the Veeam console to internal resources
🔍 How to Verify
Check if Vulnerable:
Check Veeam Service Provider Console version against the patched version in KB4649
Check Version:
Check Veeam Service Provider Console version in the application interface or installation directory
Verify Fix Applied:
Verify the version has been updated to the patched version and test that arbitrary HTTP requests to internal resources are blocked
📡 Detection & Monitoring
Log Indicators:
- Unusual HTTP requests originating from Veeam Service Provider Console to internal resources
- Multiple failed authentication attempts followed by HTTP requests
Network Indicators:
- HTTP traffic from Veeam console to unexpected internal IP addresses or services
- Pattern of requests to internal metadata services or management interfaces
SIEM Query:
source="veeam-console" AND (dest_ip=~"10.*" OR dest_ip=~"192.168.*" OR dest_ip=~"172.16.*") AND protocol="HTTP"