CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
9.0%
Patch Reissue - 2024-05-28
On May 28th, 2024, Veeam issued an enhanced update to address this critical vulnerability in Veeam Service Provider Console (VSPC). Although our initial patch, issued on May 7th, effectively addressed the primary concern, a subsequent review identified an area for further improvement. To ensure comprehensive protection, we swiftly developed and released a refined patch that fully mitigates the issue. We’re confident this updated version reinforces the security of VSPC and demonstrates our commitment to continually strengthening our response measures.
Please review the Solution section closely and ensure that your Veeam Service Provider Console deployment is updated.
Veeam Software Security Commitment
Veeam® is committed to ensuring its products protect customers from potential risks. As part of that commitment, we operate a Vulnerability Disclosure Program (VDP) for all Veeam products and perform extensive internal code audits. When a vulnerability is identified, our team promptly develops a patch to address and mitigate the risk. In line with our dedication to transparency, we publicly disclose the vulnerability and provide detailed mitigation information. This approach ensures that all potentially affected customers can quickly implement the necessary measures to safeguard their systems. It's important to note that once a vulnerability and its associated patch are disclosed, attackers will likely attempt to reverse-engineer the patch to exploit unpatched deployments of Veeam software. This reality underscores the critical importance of ensuring that all customers use the latest versions of our software and install all updates and patches without delay.
Article Applicability
This article documents a vulnerability discovered in Veeam Service Provider Console.
This vulnerability does not affect other Veeam products (e.g., Veeam Backup & Replication, Veeam Agent for Microsoft Windows, Veeam ONE).
Due to an unsafe deserialization method used by the Veeam Service Provider Console (VSPC) server in communication between the management agent and its components, under certain conditions, it is possible to perform Remote Code Execution (RCE) on the VSPC server machine.
This vulnerability was detected during internal testing.
Severity: Critical CVSS v3.1 Score: 9.9CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
The vulnerability documented in this article was fixed starting in the following builds of Veeam Service Provider Console:
Critical Update
We encourage service providers using supported versions of Veeam Service Provider Console (versions 7 & 8) to update to the latest cumulative patch. Service Providers using unsupported versions are strongly encouraged to upgrade to the latest version of Veeam Service Provider Console.
To submit feedback regarding this article, please click this link: Send Article Feedback
To report a typo on this page, highlight the typo with your mouse and press CTRL + Enter.
Vendor | Product | Version | CPE |
---|---|---|---|
veeam | service_provider_console | 8.1 | cpe:2.3:a:veeam:service_provider_console:8.1:*:*:*:*:*:*:* |
veeam | service_provider_console | 8.0 | cpe:2.3:a:veeam:service_provider_console:8.0:*:*:*:*:*:*:* |
veeam | service_provider_console | 7.0 | cpe:2.3:a:veeam:service_provider_console:7.0:*:*:*:*:*:*:* |
veeam | service_provider_console | 6.0 | cpe:2.3:a:veeam:service_provider_console:6.0:*:*:*:*:*:*:* |
veeam | service_provider_console | 5.0 | cpe:2.3:a:veeam:service_provider_console:5.0:*:*:*:*:*:*:* |
veeam | service_provider_console | 4.0 | cpe:2.3:a:veeam:service_provider_console:4.0:*:*:*:*:*:*:* |