Lucene search

K
nvd[email protected]NVD:CVE-2023-38549
HistoryNov 07, 2023 - 7:15 a.m.

CVE-2023-38549

2023-11-0707:15:09
CWE-79
web.nvd.nist.gov
veeam one
unprivileged user
ntlm hash
administrator role
web client
reporting service
vulnerability

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

4.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.0%

A vulnerability in Veeam ONE allows an unprivileged user who has access to the Veeam ONE Web Client the ability to acquire the NTLM hash of the account used by the Veeam ONE Reporting Service. Note: The criticality of this vulnerability is reduced as it requires interaction by a user with the Veeam ONE Administrator role.

Affected configurations

NVD
Node
veeamoneMatch11.0.0.1379
OR
veeamoneMatch11.0.1.1880
OR
veeamoneMatch12.0.0.2498
OR
veeamoneMatch12.0.1.2591

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

4.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.0%

Related for NVD:CVE-2023-38549