securityonline.info
Open in
urlscan Pro
2a05:d014:776:a63e:ceb:15ad:bbb7:6a9d
Public Scan
URL:
https://securityonline.info/cve-2024-40715-authentication-bypass-threat-in-veeam-backup-enterprise-manager/
Submission: On November 08 via api from IN — Scanned from GB
Submission: On November 08 via api from IN — Scanned from GB
Form analysis
3 forms found in the DOMhttps://securityonline.info/
<form role="search" class="search-form" action="https://securityonline.info/"><label><span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Search …" name="s"></label>
<input type="submit" class="search-submit" value="Search">
</form>
https://securityonline.info/
<form role="search" class="search-form" action="https://securityonline.info/"><label><span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Search …" name="s"></label>
<input type="submit" class="search-submit" value="Search">
</form>
<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id1">
<table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url("https://www.google.com/cse/static/images/1x/en/branding.png") left center no-repeat rgb(255, 255, 255); outline: none;"
dir="ltr" spellcheck="false"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" style="display: none;" title="Clear search box" role="button"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>search</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="clear results"> </div>
</td>
</tr>
</tbody>
</table>
</form>
Text Content
Skip to content Cybersecurity News * Search for: * Home * Cyber Security * Data Leak * Linux * Malware Attack * Open Source Tool * Technology * Vulnerability * Windows * Home * Cyber Security * Data Leak * Linux * Malware Attack * Open Source Tool * Technology * Vulnerability * Windows Search for: Cybersecurity News * Vulnerability CVE-2024-40715: AUTHENTICATION BYPASS THREAT IN VEEAM BACKUP ENTERPRISE MANAGER by do son · November 7, 2024 Veeam recently disclosed a new security vulnerability, tracked as CVE-2024-40715, that impacts Veeam Backup Enterprise Manager. With a CVSS score of 7.7, this flaw is classified as a high-severity vulnerability, primarily affecting users of Veeam Backup Enterprise Manager who may be vulnerable to Man-in-the-Middle (MITM) attacks. 1. x Please enable JavaScript Video Player is loading. Play Video Pause Unmute Current Time 0:04 / Duration 25:42 00:04 Remaining Time -25:38 1x Playback Rate * 2x * 1.5x * 1x, selected * 0.5x Captions * captions off, selected Watch on Humix Auto(360pLQ) * Back Settings ShareFullscreen 2. 1. Now Playing Up NextViltrox AF 24mm F1.8 STM FE Definitive Review | 4K 25:42 2. Now Playing Up NextHow to Bypass Google Account Verification in ARCHOS 45c Helium 4G 5:33 3. Now Playing Up NextAzure Security Strategies you ought to know 35:22 4. Now Playing Up NextDrive security enforcement across Microsoft Teams, SharePoint and Office 365 by Luzaan Lottering 30:07 5. Now Playing Up NextAutomate(d) security with Azure Security Center || IT Security Virtual Conference 2021 48:08 6. Now Playing Up NextMongoDB Backup Options 4:01 7. Now Playing Up NextSecure Azure Resources using Azure Private Link || IT Security Virtual Conference 2021 38:17 8. Now Playing Up NextNIMR ISNR 2016 Ajban 440 police protected vehicle Ajban ISV SWAT assault ladder 4x4 armored vehicle 4:28 9. Now Playing Up NextImportance of NoSQL Database 2:58 10. Now Playing Up NextAutomating Quality: SCA, SAST, DAST and more 41:59 11. x Please enable JavaScript Video Player is loading. Play Video Play Mute Current Time 0:00 / Duration 25:42 00:00 Remaining Time -25:42 1x Playback Rate Captions * captions off, selected Picture-in-PictureWatch on Humix Settings * Settings * Speed1x * Qualityauto * Back * 2x * 1.5x * 1x, selected * 0.5x * Back Auto(360pLQ) ShareFullscreen Viltrox AF 24mm F1.8 STM FE Definitive Review | 4K Share Watch on Viltrox AF 24mm F1.8 STM FE Definitive Review | 4K The vulnerability allows attackers to bypass authentication through a MITM attack, which could have significant implications for organizations relying on Veeam’s backup solutions for data security. According to the Veeam advisory, “this vulnerability in Veeam Backup Enterprise Manager allows attackers to bypass the authentication while performing a Man-in-the-Middle (MITM) attack.” Successful exploitation could potentially allow attackers to intercept, modify, or even halt data transmissions, exposing critical business data to unauthorized access. Credit for discovering and responsibly disclosing CVE-2024-40715 goes to researchers ZDI, working through Hacker One. Veeam has addressed this vulnerability with a hotfix for Veeam Backup Enterprise Manager version 12.2.0.334, released on November 6, 2024. Users with earlier versions of Veeam Backup Enterprise Manager, such as 12.1.2.172 or older, are urged to upgrade to version 12.2.0.334, which includes the essential fix to secure against this vulnerability. For existing installations of Veeam Backup Enterprise Manager 12.2.0.334, the hotfix can be downloaded directly. After applying the hotfix, a reboot might be necessary, as the advisory notes, “please note that a reboot may be required after installing the hotfix.” As this is a hotfix, it doesn’t change the build number of the software. To ensure the patch is applied, Veeam provides a way for administrators to validate the fix. “Validating that the hotfix has been deployed requires checking the hash value of the file present on the system and comparing it to the known hash value of the file included in the hotfix,” Veeam explains in the advisory. Administrators can use the following PowerShell command to check the SHA1 hash of the patched DLL file: Get-FileHash -Path 'C:\Program Files\Veeam\Backup and Replication\Enterprise Manager\Veeam.Backup.Enterprise.Core.dll' -Algorithm SHA1 The file hash should match the hotfix’s published SHA1 hash: FDC176FCE4825023F14462A51541C1DF591B28AC. Matching hashes confirm that the fix is correctly in place, reducing the risk of unauthorized access through MITM attacks. RELATED POSTS: * Broadcom Urges Immediate Patching for Critical Symantec PAM Vulnerabilities * PoC Exploit Releases for Unauthenticated RCE CVE-2024-40711 in Veeam Backup & Replication * CISA Warns of Active Exploitation in SolarWinds Web Help Desk Vulnerability * Veeam Backup & Replication Faces RCE Flaw– CVE-2024-40711 (CVSS 9.8) Allows Full System Takeover * Fog & Akira Ransomware Exploit Critical Veeam RCE Flaw CVE-2024-40711 After PoC Release Share Tags: CVE-2024-40715Veeam Backup Enterprise Manager Follow: * * * * * SEARCH × search Visit Penetration Testing Tools & The Information Technology Daily Support Securityonline.info site. Thanks! * Vulnerability SAP Patches Critical BusinessObjects Vulnerability with October Security Updates October 8, 2024 * Vulnerability Apache Roller Patches CSRF Flaw CVE-2024-46911 in Latest Update October 13, 2024 * Vulnerability SolarWinds Web Help Desk Hit With Critical RCE Flaw (CVE-2024-28988, CVSS 9.8) October 17, 2024 * Vulnerability CVE-2024-47901 (CVSS 10): Critical Security Flaw in Siemens InterMesh October 24, 2024 * Vulnerability 14-Year Vulnerability in qBittorrent Leaves Millions Exposed to RCE Attacks October 30, 2024 Reward BRILLIANTLY SAFE! securityonline.info CONTENT & LINKS Verified by Sur.ly 2022 WEBSITE 1. About SecurityOnline.info 2. Advertise on SecurityOnline.info 3. Contact * About Us * Contact Us * Disclaimer * Privacy Policy * DMCA NOTICE * Sponsors Cybersecurity News © 2024. All Rights Reserved. * * * * * x ✕ PRIVACY & TRANSPARENCY securityonline.info and our partners ask for your consent to use your personal data, and to store and/or access information on your device. This includes using your personal data for personalised advertising and content, advertising and content measurement, audience research and services development. An example of data being processed may be a unique identifier stored in a cookie. Your personal data may be stored by, accessed by, and shared with 906 partners, or used specifically by this site. You can change your settings or withdraw consent at any time, the link to do so is in our privacy policy at the bottom of this page. Some vendors may process your personal data on the basis of legitimate interest, which you can object to by managing your settings below. Manage Settings Allow Necessary Cookies & Continue Continue with Recommended Cookies Vendor List | Privacy Policy