Veeam Backup Enterprise Manager: Unauthorized access by attackers possible

An important security update protects Veeam Backup Enterprise Manager against possible attacks.

listen Print view

(Image: Sashkin/Shutterstock.com)

1 min. read

Attackers can target Veeam Backup Enterprise Manager (VBEM) and hack into connections. A security patch is available for download.

With VBEM, admins manage the backup solution Backup & Replication (VBR) via a web console. The management solution is optional. Admins can use the following commands to check whether VBEM is installed on their systems:

Get-VBRServer | Out-Null
[Veeam.Backup.Core.SBackupOptions]::GetEnterpriseServerInfo() | Format-List

If attackers successfully exploit the vulnerability (CVE-2024-40715"high"), they can bypass authentication and eavesdrop on connections as a man-in-the-middle. How this could work in detail is not yet known. In a warning message, the developers link to the version VBEM 12.2.0.334 , which is secured against this.

Videos by heise

Because Veeam software is a popular target for attackers, admins should install the repaired version as soon as possible. In mid-October, Sophos warned of attacks on a vulnerability in Veeam Backup & Replication. The malicious actors attempted to install ransomware through it. An update to close the critical vulnerability (CVE-2024-40711) has been available since the beginning of September.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.