Lucene search

K
veeamVeeam softwareVEEAM:KB4575
HistoryMay 07, 2024 - 12:00 a.m.

Veeam Service Provider Console Vulnerability ( CVE-2024-29212 )

2024-05-0700:00:00
Veeam software
www.veeam.com
25
veeam
service provider console
vulnerability
cve-2024-29212
unsafe deserialization
remote code execution
rce
software

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

9.1

Confidence

High

EPSS

0

Percentile

9.0%


Patch Reissue - 2024-05-28

On May 28th, 2024, Veeam issued an enhanced update to address this critical vulnerability in Veeam Service Provider Console (VSPC). Although our initial patch, issued on May 7th, effectively addressed the primary concern, a subsequent review identified an area for further improvement. To ensure comprehensive protection, we swiftly developed and released a refined patch that fully mitigates the issue. We’re confident this updated version reinforces the security of VSPC and demonstrates our commitment to continually strengthening our response measures.

Please review the Solution section closely and ensure that your Veeam Service Provider Console deployment is updated.


Veeam Software Security Commitment

Veeam® is committed to ensuring its products protect customers from potential risks. As part of that commitment, we operate a Vulnerability Disclosure Program (VDP) for all Veeam products and perform extensive internal code audits. When a vulnerability is identified, our team promptly develops a patch to address and mitigate the risk. In line with our dedication to transparency, we publicly disclose the vulnerability and provide detailed mitigation information. This approach ensures that all potentially affected customers can quickly implement the necessary measures to safeguard their systems. It's important to note that once a vulnerability and its associated patch are disclosed, attackers will likely attempt to reverse-engineer the patch to exploit unpatched deployments of Veeam software. This reality underscores the critical importance of ensuring that all customers use the latest versions of our software and install all updates and patches without delay.


Article Applicability

This article documents a vulnerability discovered in Veeam Service Provider Console.

This vulnerability does not affect other Veeam products (e.g., Veeam Backup & Replication, Veeam Agent for Microsoft Windows, Veeam ONE).

Issue Details

CVE-2024-29212

Due to an unsafe deserialization method used by the Veeam Service Provider Console (VSPC) server in communication between the management agent and its components, under certain conditions, it is possible to perform Remote Code Execution (RCE) on the VSPC server machine.

This vulnerability was detected during internal testing.

Severity: Critical CVSS v3.1 Score: 9.9CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Solution

The vulnerability documented in this article was fixed starting in the following builds of Veeam Service Provider Console:


Critical Update

We encourage service providers using supported versions of Veeam Service Provider Console (versions 7 & 8) to update to the latest cumulative patch. Service Providers using unsupported versions are strongly encouraged to upgrade to the latest version of Veeam Service Provider Console.

To submit feedback regarding this article, please click this link: Send Article Feedback
To report a typo on this page, highlight the typo with your mouse and press CTRL + Enter.

Affected configurations

Vulners
Node
veeamservice_provider_consoleMatch8.1
OR
veeamservice_provider_consoleMatch8.0
OR
veeamservice_provider_consoleMatch7.0
OR
veeamservice_provider_consoleMatch6.0
OR
veeamservice_provider_consoleMatch5.0
OR
veeamservice_provider_consoleMatch4.0
VendorProductVersionCPE
veeamservice_provider_console8.1cpe:2.3:a:veeam:service_provider_console:8.1:*:*:*:*:*:*:*
veeamservice_provider_console8.0cpe:2.3:a:veeam:service_provider_console:8.0:*:*:*:*:*:*:*
veeamservice_provider_console7.0cpe:2.3:a:veeam:service_provider_console:7.0:*:*:*:*:*:*:*
veeamservice_provider_console6.0cpe:2.3:a:veeam:service_provider_console:6.0:*:*:*:*:*:*:*
veeamservice_provider_console5.0cpe:2.3:a:veeam:service_provider_console:5.0:*:*:*:*:*:*:*
veeamservice_provider_console4.0cpe:2.3:a:veeam:service_provider_console:4.0:*:*:*:*:*:*:*

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

9.1

Confidence

High

EPSS

0

Percentile

9.0%

Related for VEEAM:KB4575