Alert!

Patch now! Veeam Backup Enterprise Manager at risk from attacks

Because exploit code for a critical vulnerability in Veeam Backup Enterprise Manager is now in circulation, attacks may be imminent.

listen Print view
Stylized image: Software update on laptop

Updates are available.

(Image: Bild erstellt mit KI in Bing Designer durch heise online / dmk)

2 min. read

Admins who manage backup instances in companies using Veeam Backup Enterprise Manager should update the application quickly. If this is not done, attackers can exploit a vulnerability and authenticate themselves as any user without logging into the web interface.

The vulnerability (CVE-2024-29849) is classified as"critical". It has been known since the end of May 2024. The developers state that they have closed the vulnerability in version 12.1.2.172. Four other vulnerabilities were also closed in this release. If attackers successfully exploit these vulnerabilities, they can take over existing accounts or gain unauthorized access to backup logs, among other things.

Exploit code from a security researcher is now in circulation that cyber criminals can abuse. According to him, the vulnerability is in the Veeam.Backup.Enterprise.RestAPIService.exe service. The service serves as a REST API for the main web application and listens on TCP port 9398. To initiate an attack, attackers must send a crafted VMware single sign-on (SSO) token to the vulnerable service via the API.

Videos by heise

Because Veeam does not verify the token, they can impersonate the admin. The security researcher provides further details on the attack in his detailed report. It also explains in detail how an attack can take place.

So far, however, there are no reports of ongoing attacks. However, as this can change at any time, admins should act immediately and install the secure version of Veeam Backup Enterprise Manager.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.