A vulnerability in Veeam Backup & Replication allows a low-privileged user with certain roles to perform remote code execution (RCE) by updating existing jobs. These jobs can be configured to run pre- and post-scripts, which can be located on a network share and are executed with elevated privileges by default. The user can update a job and schedule it to run almost immediately, allowing arbitrary code execution on the server.
References
Link | Resource |
---|---|
https://www.veeam.com/kb4693 | Vendor Advisory |
Configurations
History
24 Apr 2025, 17:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.veeam.com/kb4693 - Vendor Advisory | |
CPE | cpe:2.3:a:veeam:veeam_backup_\&_replication:*:*:*:*:*:*:*:* | |
First Time |
Veeam veeam Backup \& Replication
Veeam |
13 Mar 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CWE | CWE-306 |
04 Dec 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-04 02:15
Updated : 2025-04-24 17:21
NVD link : CVE-2024-40717
Mitre link : CVE-2024-40717
CVE.ORG link : CVE-2024-40717
JSON object : View
Products Affected
veeam
- veeam_backup_\&_replication
CWE
CWE-306
Missing Authentication for Critical Function