securityonline.info Open in urlscan Pro
2a05:d014:776:a63e:ceb:15ad:bbb7:6a9d  Public Scan

URL: https://securityonline.info/cve-2024-40715-authentication-bypass-threat-in-veeam-backup-enterprise-manager/
Submission: On November 08 via api from IN — Scanned from GB

Form analysis 3 forms found in the DOM

https://securityonline.info/

<form role="search" class="search-form" action="https://securityonline.info/"><label><span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" name="s"></label>
  <input type="submit" class="search-submit" value="Search">
</form>

https://securityonline.info/

<form role="search" class="search-form" action="https://securityonline.info/"><label><span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" name="s"></label>
  <input type="submit" class="search-submit" value="Search">
</form>

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url(&quot;https://www.google.com/cse/static/images/1x/en/branding.png&quot;) left center no-repeat rgb(255, 255, 255); outline: none;"
                      dir="ltr" spellcheck="false"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" style="display: none;" title="Clear search box" role="button"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Skip to content

Cybersecurity News


 * Search for:

 * Home
 * Cyber Security
 * Data Leak
 * Linux
 * Malware Attack
 * Open Source Tool
 * Technology
 * Vulnerability
 * Windows

 * Home
 * Cyber Security
 * Data Leak
 * Linux
 * Malware Attack
 * Open Source Tool
 * Technology
 * Vulnerability
 * Windows

Search for:

Cybersecurity News


 * Vulnerability


CVE-2024-40715: AUTHENTICATION BYPASS THREAT IN VEEAM BACKUP ENTERPRISE MANAGER

by do son · November 7, 2024




Veeam recently disclosed a new security vulnerability, tracked as
CVE-2024-40715, that impacts Veeam Backup Enterprise Manager. With a CVSS score
of 7.7, this flaw is classified as a high-severity vulnerability, primarily
affecting users of Veeam Backup Enterprise Manager who may be vulnerable to
Man-in-the-Middle (MITM) attacks.

 1. x
    
    Please enable JavaScript
    
    
    
    Video Player is loading.
    Play Video
    Pause
    Unmute
    
    Current Time 0:04
    /
    Duration 25:42
    00:04
    
    
    Remaining Time -25:38
    1x
    Playback Rate
     * 2x
     * 1.5x
     * 1x, selected
     * 0.5x
    
    Captions
     * captions off, selected
    
    Watch on Humix
    Auto(360pLQ)
     * Back
    
    Settings
    
    ShareFullscreen
    
    
    
 2.  1.  Now Playing
         Up NextViltrox AF 24mm F1.8 STM FE Definitive Review | 4K
         25:42
     2.  Now Playing
         Up NextHow to Bypass Google Account Verification in ARCHOS 45c Helium
         4G
         5:33
     3.  Now Playing
         Up NextAzure Security Strategies you ought to know
         35:22
     4.  Now Playing
         Up NextDrive security enforcement across Microsoft Teams, SharePoint
         and Office 365 by Luzaan Lottering
         30:07
     5.  Now Playing
         Up NextAutomate(d) security with Azure Security Center || IT Security
         Virtual Conference 2021
         48:08
     6.  Now Playing
         Up NextMongoDB Backup Options
         4:01
     7.  Now Playing
         Up NextSecure Azure Resources using Azure Private Link || IT Security
         Virtual Conference 2021
         38:17
     8.  Now Playing
         Up NextNIMR ISNR 2016 Ajban 440 police protected vehicle Ajban ISV SWAT
         assault ladder 4x4 armored vehicle
         4:28
     9.  Now Playing
         Up NextImportance of NoSQL Database
         2:58
     10. Now Playing
         Up NextAutomating Quality: SCA, SAST, DAST and more
         41:59
     11. 


x

Please enable JavaScript



Video Player is loading.
Play Video
Play
Mute

Current Time 0:00
/
Duration 25:42
00:00


Remaining Time -25:42
1x
Playback Rate

Captions
 * captions off, selected

Picture-in-PictureWatch on Humix
Settings
 * Settings
 * Speed1x
 * Qualityauto

 * Back
 * 2x
 * 1.5x
 * 1x, selected
 * 0.5x

 * Back

Auto(360pLQ)

ShareFullscreen






Viltrox AF 24mm F1.8 STM FE Definitive Review | 4K
Share
Watch on



Viltrox AF 24mm F1.8 STM FE Definitive Review | 4K

The vulnerability allows attackers to bypass authentication through a MITM
attack, which could have significant implications for organizations relying on
Veeam’s backup solutions for data security. According to the Veeam advisory,
“this vulnerability in Veeam Backup Enterprise Manager allows attackers to
bypass the authentication while performing a Man-in-the-Middle (MITM) attack.”
Successful exploitation could potentially allow attackers to intercept, modify,
or even halt data transmissions, exposing critical business data to unauthorized
access.

Credit for discovering and responsibly disclosing CVE-2024-40715 goes to
researchers ZDI, working through Hacker One.

Veeam has addressed this vulnerability with a hotfix for Veeam Backup Enterprise
Manager version 12.2.0.334, released on November 6, 2024. Users with earlier
versions of Veeam Backup Enterprise Manager, such as 12.1.2.172 or older, are
urged to upgrade to version 12.2.0.334, which includes the essential fix to
secure against this vulnerability.

For existing installations of Veeam Backup Enterprise Manager 12.2.0.334, the
hotfix can be downloaded directly. After applying the hotfix, a reboot might be
necessary, as the advisory notes, “please note that a reboot may be required
after installing the hotfix.”

As this is a hotfix, it doesn’t change the build number of the software. To
ensure the patch is applied, Veeam provides a way for administrators to validate
the fix. “Validating that the hotfix has been deployed requires checking the
hash value of the file present on the system and comparing it to the known hash
value of the file included in the hotfix,” Veeam explains in the advisory.

Administrators can use the following PowerShell command to check the SHA1 hash
of the patched DLL file:

Get-FileHash -Path 'C:\Program Files\Veeam\Backup and Replication\Enterprise Manager\Veeam.Backup.Enterprise.Core.dll' -Algorithm SHA1



The file hash should match the hotfix’s published SHA1 hash:
FDC176FCE4825023F14462A51541C1DF591B28AC. Matching hashes confirm that the fix
is correctly in place, reducing the risk of unauthorized access through MITM
attacks.


RELATED POSTS:

 * Broadcom Urges Immediate Patching for Critical Symantec PAM Vulnerabilities
 * PoC Exploit Releases for Unauthenticated RCE CVE-2024-40711 in Veeam Backup &
   Replication
 * CISA Warns of Active Exploitation in SolarWinds Web Help Desk Vulnerability
 * Veeam Backup & Replication Faces RCE Flaw– CVE-2024-40711 (CVSS 9.8) Allows
   Full System Takeover
 * Fog & Akira Ransomware Exploit Critical Veeam RCE Flaw CVE-2024-40711 After
   PoC Release


Share







Tags: CVE-2024-40715Veeam Backup Enterprise Manager

Follow:

 * 
 * 
 * 
 * 
 * 


SEARCH

×

search
 

Visit Penetration Testing Tools & The Information Technology Daily

Support Securityonline.info site. Thanks!


 * Vulnerability
   
   SAP Patches Critical BusinessObjects Vulnerability with October Security
   Updates
   
   October 8, 2024

 * Vulnerability
   
   Apache Roller Patches CSRF Flaw CVE-2024-46911 in Latest Update
   
   October 13, 2024

 * Vulnerability
   
   SolarWinds Web Help Desk Hit With Critical RCE Flaw (CVE-2024-28988, CVSS
   9.8)
   
   October 17, 2024

 * Vulnerability
   
   CVE-2024-47901 (CVSS 10): Critical Security Flaw in Siemens InterMesh
   
   October 24, 2024

 * Vulnerability
   
   14-Year Vulnerability in qBittorrent Leaves Millions Exposed to RCE Attacks
   
   October 30, 2024



Reward


BRILLIANTLY

SAFE!




securityonline.info


CONTENT & LINKS

Verified by Sur.ly



2022


WEBSITE

 1. About SecurityOnline.info
 2. Advertise on SecurityOnline.info
 3. Contact



 * About Us
 * Contact Us
 * Disclaimer
 * Privacy Policy
 * DMCA NOTICE
 * Sponsors

Cybersecurity News © 2024. All Rights Reserved.

 * 
 * 
 * 
 * 
 * 


x


✕


PRIVACY & TRANSPARENCY

securityonline.info and our partners ask for your consent to use your personal
data, and to store and/or access information on your device. This includes using
your personal data for personalised advertising and content, advertising and
content measurement, audience research and services development. An example of
data being processed may be a unique identifier stored in a cookie. Your
personal data may be stored by, accessed by, and shared with 906 partners, or
used specifically by this site. You can change your settings or withdraw consent
at any time, the link to do so is in our privacy policy at the bottom of this
page. Some vendors may process your personal data on the basis of legitimate
interest, which you can object to by managing your settings below.



Manage Settings Allow Necessary Cookies & Continue Continue with Recommended
Cookies

Vendor List | Privacy Policy