Veeam Warns About Critical Vulnerabilities in Its Service Provider Console

Veeam Software has announced the release of security updates to address two critical vulnerabilities in its Service Provider Console (VSPC), a platform designed to manage Backup as a Service (BaaS) and Disaster Recovery as a Service (DRaaS). These flaws, identified as CVE-2024-42448 and CVE-2024-42449, were discovered during internal audits and pose significant risks if the appropriate patches are not applied.

A critical remote code execution vulnerability

The most severe vulnerability, CVE-2024-42448, has a score of 9.9 out of 10 on the CVSS scale, highlighting its danger. This flaw allows attackers to execute arbitrary code on unpatched VSPC servers from a machine with an authorized management agent. According to Veeam, this type of vulnerability could be exploited to compromise servers and gain full control over them.

On the other hand, the vulnerability CVE-2024-42449, with high severity and a CVSS score of 7.1, enables attackers to steal NTLM hashes from the VSPC server and delete files, potentially leading to significant data loss and disruption of critical services.

Both vulnerabilities affect versions 8.1.0.21377 and earlier of the console, including versions 7 and 8. Furthermore, Veeam warns that unsupported products should also be considered vulnerable, even though they were not subjected to specific testing.

The importance of immediate updating

In its statement, Veeam urged service providers using supported versions of VSPC to install the updates as soon as possible to mitigate associated risks. Users of unsupported versions are highly recommended to upgrade to the latest version of the console.

This warning comes at a time when attacks on similar vulnerabilities have proven to be particularly destructive. According to recent reports from Sophos X-Ops, a remote code execution flaw in Veeam’s Backup & Replication, identified in September 2024 as CVE-2024-40711, has been leveraged to deploy ransomware such as Frag, Akira, and Fog on unprotected servers.

Proactive security measures

Veeam emphasizes its commitment to the security of its products, highlighting the importance of applying security updates to prevent the exploitation of vulnerable systems. Once a patch is made public, it is common for attackers to attempt reverse engineering to identify and exploit flaws in unpatched systems.

Moreover, the company stresses that these vulnerabilities can only be exploited if the management agent is authorized on the target server, underscoring the importance of implementing strict access and monitoring policies.

The impact on the industry

With over 550,000 customers worldwide, including 74% of the Global 2000 companies and 82% of Fortune 500 companies, Veeam’s tools are essential for the operational continuity of many organizations. This incident highlights the increasing need to maintain robust cybersecurity practices in an ever-evolving threat environment.

Veeam’s prompt response to these vulnerabilities demonstrates the critical role that internal audit processes and vulnerability disclosure programs play in protecting modern systems. However, as cybersecurity experts have pointed out, the key to preventing attacks lies in the timely updating of all affected systems.

via: Veeam and Open Security

Scroll to Top