CVE-2024-45207
📋 TL;DR
This vulnerability allows DLL injection in Veeam Agent for Windows when the system's PATH variable includes insecure directories. Attackers can place malicious DLLs in these locations, which the agent may load during execution, enabling arbitrary code execution. This affects all Windows systems running vulnerable versions of Veeam Agent.
💻 Affected Systems
- Veeam Agent for Windows
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with administrative privileges, enabling data theft, ransomware deployment, or complete service disruption of backup operations.
Likely Case
Local privilege escalation leading to unauthorized access to backup data and potential lateral movement within the network.
If Mitigated
Limited impact with proper PATH variable hardening and restricted user permissions preventing DLL placement in insecure locations.
🎯 Exploit Status
Requires local access to place malicious DLLs in PATH directories and trigger Veeam Agent execution.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Veeam KB4693 for latest patched version
Vendor Advisory: https://www.veeam.com/kb4693
Restart Required: No
Instructions:
1. Download latest Veeam Agent for Windows from official portal. 2. Run installer with administrative privileges. 3. Follow on-screen upgrade instructions. 4. Verify successful update in agent interface.
🔧 Temporary Workarounds
Secure PATH Environment Variable
WindowsRemove insecure directories from system PATH variable to prevent DLL search in untrusted locations.
Control Panel > System > Advanced system settings > Environment Variables > Edit PATH variable to remove insecure directories
🧯 If You Can't Patch
- Restrict write permissions to directories in PATH variable to prevent DLL placement
- Implement application whitelisting to block execution of unauthorized DLLs
🔍 How to Verify
Check if Vulnerable:
Check Veeam Agent version and compare against patched versions in KB4693. Also verify PATH variable contains only secure directories.
Check Version:
Open Veeam Agent for Windows > Help > About to view version
Verify Fix Applied:
Confirm Veeam Agent version matches or exceeds patched version from KB4693 and test agent functionality.
📡 Detection & Monitoring
Log Indicators:
- Unusual DLL loading events in Windows Event Logs (Security/System)
- Veeam Agent process loading DLLs from unexpected locations
Network Indicators:
- None - local exploitation only
SIEM Query:
EventID=7 OR EventID=11 WHERE ImagePath contains 'Veeam' AND ProcessCommandLine contains suspicious DLL paths