Lucene search

K
veeamVeeam softwareVEEAM:KB4231
HistoryNov 01, 2021 - 12:00 a.m.

Veeam Best Practices regarding CVE-2021-36934

2021-11-0100:00:00
Veeam software
www.veeam.com
79
veeam
windows
elevation of privilege
vulnerability
mitigation steps
shadow copies
workarounds
impact

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

High

EPSS

0.004

Percentile

74.3%

Challenge

This article documents Veeam’s position on Windows Elevation of Privilege Vulnerability CVE-2021-36934. Specifically regarding the listed mitigation steps involving removal of all shadow copies, and the β€œImpact of workaround” mentioned in the Workarounds section of CVE-2021-36934.

Solution

While VSS and shadow copies are mentioned in CVE-2021-36934, shadow copy mechanisms are not part of the vulnerability. The advice to remove all shadow copies is because shadow copies created before the update may contain exploitable data.

The Workarounds section of CVE-2021-36934 states, β€œDeleting shadow copies could impact restore operations, including the ability to restore data with third-party backup applications.” This statement does not apply to Veeam products (such as Backup & Replication or Agent for Windows). Veeam uses volatile shadow copies, which are deleted automatically when the backup job completes.

Deletion of VSS shadow copies, as advised in CVE-2021-36934, will not affect Veeam backups.

To submit feedback regarding this article, please click this link: Send Article Feedback
To report a typo on this page, highlight the typo with your mouse and press CTRL + Enter.

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

High

EPSS

0.004

Percentile

74.3%