4.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
6.4 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
14.2%
The version of Veeam ONE installed on the remote Windows host is affected by an information disclosure vulnerability, as disclosed in the vendor’s advisory with KB ID 4508. A vulnerability in Veeam ONE allows an unprivileged user who has access to the Veeam ONE Web Client the ability to acquire the NTLM hash of the account used by the Veeam ONE Reporting Service.
Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(185460);
script_version("1.4");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/12/21");
script_cve_id("CVE-2023-38548");
script_xref(name:"IAVA", value:"2023-A-0607");
script_name(english:"Veeam ONE 12.x < 12.0.1.2591 Information Disclosure (KB4508)");
script_set_attribute(attribute:"synopsis", value:
"Veeam ONE installed on remote Windows host is affected by an information disclosure vulnerability");
script_set_attribute(attribute:"description", value:
"The version of Veeam ONE installed on the remote Windows host is affected by an information disclosure vulnerability,
as disclosed in the vendor's advisory with KB ID 4508. A vulnerability in Veeam ONE allows an unprivileged user who has
access to the Veeam ONE Web Client the ability to acquire the NTLM hash of the account used by the Veeam ONE Reporting
Service.
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported
version number.");
script_set_attribute(attribute:"see_also", value:"https://www.veeam.com/kb4508");
script_set_attribute(attribute:"solution", value:
"Upgrade to Veeam ONE version 12.0.1.2591 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-38548");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2023/11/06");
script_set_attribute(attribute:"patch_publication_date", value:"2023/11/06");
script_set_attribute(attribute:"plugin_publication_date", value:"2023/11/10");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:veeam:one");
script_set_attribute(attribute:"stig_severity", value:"I");
script_set_attribute(attribute:"thorough_tests", value:"true");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("veeam_one_win_installed.nbin");
script_require_keys("installed_sw/Veeam ONE", "SMB/Registry/Enumerated");
exit(0);
}
include('vcf.inc');
get_kb_item_or_exit('SMB/Registry/Enumerated');
var app_info = vcf::get_app_info(app:'Veeam ONE', win_local:TRUE);
var constraints = [
{'min_version': '12.0', 'fixed_version': '12.0.1.2591', 'fixed_display': 'Veeam ONE 12 (12.0.1.2591)'}
];
vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);
4.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
6.4 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
14.2%