CVE-2025-24287

6.1 MEDIUM

📋 TL;DR

This vulnerability allows local system users to modify directory contents, potentially leading to arbitrary code execution with elevated permissions. It affects systems running vulnerable versions of Veeam software where local users have access to specific directories. The risk is primarily to organizations using Veeam products in multi-user environments.

💻 Affected Systems

Products:
  • Veeam Backup & Replication
Versions: Versions prior to the fix in KB4743
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local user access to specific directories; multi-user environments are most at risk.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

A local attacker gains full system control through arbitrary code execution with elevated permissions, potentially compromising the entire system and connected infrastructure.

🟠

Likely Case

A malicious insider or compromised local account modifies directory contents to execute malicious code, leading to data theft, privilege escalation, or lateral movement.

🟢

If Mitigated

With proper access controls and monitoring, exploitation attempts are detected and prevented, limiting impact to isolated incidents.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring authenticated local access, not directly exploitable from the internet.
🏢 Internal Only: HIGH - Local users with access to vulnerable systems can exploit this to gain elevated privileges and potentially compromise the entire system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local user access and knowledge of directory manipulation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version specified in Veeam KB4743

Vendor Advisory: https://www.veeam.com/kb4743

Restart Required: Yes

Instructions:

1. Download the patch from Veeam KB4743. 2. Apply the patch to all affected Veeam Backup & Replication servers. 3. Restart the Veeam services or the entire server as required.

🔧 Temporary Workarounds

Restrict directory permissions

windows

Limit write access to vulnerable directories to only necessary service accounts

icacls "C:\Program Files\Veeam\Backup and Replication\" /deny Users:(OI)(CI)W

Implement least privilege

all

Ensure local users have minimal necessary permissions and cannot write to Veeam directories

🧯 If You Can't Patch

  • Implement strict access controls to limit which local users can access Veeam directories
  • Enable detailed auditing and monitoring of directory modification attempts

🔍 How to Verify

Check if Vulnerable:

Check Veeam Backup & Replication version against the patched version in KB4743

Check Version:

Open Veeam Backup & Replication console and check Help > About, or check installed programs in Windows

Verify Fix Applied:

Verify the installed version matches or exceeds the patched version from KB4743

📡 Detection & Monitoring

Log Indicators:

  • Unexpected modifications to Veeam program directories
  • Unauthorized write attempts to Veeam folders
  • Suspicious process execution from Veeam directories

Network Indicators:

  • Unusual outbound connections from Veeam servers
  • Lateral movement attempts from Veeam systems

SIEM Query:

EventID=4663 AND ObjectName LIKE '%Veeam%' AND Accesses LIKE '%Write%'

🔗 References

📤 Share & Export