A critical security vulnerability in Veeam Backup Enterprise Manager could allow threat actors to bypass authentication.
A critical vulnerability, tracked as CVE-2024-29849 (CVSS score: 9.8), in Veeam Backup Enterprise Manager could allow attackers to bypass authentication.
Veeam Backup Enterprise Manager is a centralized management and reporting tool designed to simplify the administration of Veeam Backup & Replication environments. It offers a web-based interface that allows users to manage multiple Veeam Backup & Replication servers, monitor backup jobs, and generate reports.
“
The company has addressed the following vulnerabilities in Veeam Backup Enterprise Manager:
- CVE-2024-29850 (CVSS score: 8.8) – the flaw allows account takeover via NTLM relay.
The four vulnerabilities have been addressed with the release of version 12.1.2.172. The company also provided the following mitigation:
- This vulnerability can be mitigated by halting the Veeam Backup Enterprise Manager software.
To do this, stop and disable the following services:
- VeeamEnterpriseManagerSvc (Veeam Backup Enterprise Manager)VeeamRESTSvc (Veeam RESTful API Service)
Note: Do not stop the ‘Veeam Backup Server RESTful API Service’.
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, Veeam)