Lucene search

K
veeamVeeam softwareVEEAM:KB4288
HistoryMar 12, 2022 - 12:00 a.m.

CVE-2022-26500 | CVE-2022-26501

2022-03-1200:00:00
Veeam software
www.veeam.com
34
veeam backup & replication
remote code execution
authentication bypass
system takeover

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.083

Percentile

94.4%

Challenge

Multiple vulnerabilities (CVE-2022-26500, CVE-2022-26501) in Veeam Backup & Replication allow executing malicious code remotely without authentication. This may lead to gaining control over the target system.

Severity: Critical CVSS v3 score: 9.8

Cause

The Veeam Distribution Service (TCP 9380 by default) allows unauthenticated users to access internal API functions. A remote attacker may send input to the internal API which may lead to uploading and executing of malicious code.

Solution

Patches are available for the following Veeam Backup & Replication versions:

Notes:

  • The patch must be installed on the Veeam Backup & Replication server. Managed servers with Veeam Distribution Service will be updated automatically after installing the patch.
  • All new deployments of Veeam Backup & Replication version 11a and 10a installed using the ISO images dated 20220302 or later are not vulnerable.
  • If you are using Veeam Backup & Replication 9.5, please upgrade to a supported product version.
  • Temporary mitigation of the vulnerabilities: Stop and disable the Veeam Distribution Service. The Veeam Distribution Service is installed on the Veeam Backup & Replication server and servers specified as distribution servers in Protection Groups.

More Information

These vulnerabilities were reported by Nikita Petrov (Positive Technologies).

To submit feedback regarding this article, please click this link: Send Article Feedback
To report a typo on this page, highlight the typo with your mouse and press CTRL + Enter.

Affected configurations

Vulners
Node
veeamveeam_backup_\&_replicationMatch11
OR
veeamveeam_backup_\&_replicationMatch10
OR
veeamveeam_backup_\&_replicationMatch9.5
VendorProductVersionCPE
veeamveeam_backup_\&_replication11cpe:2.3:a:veeam:veeam_backup_\&_replication:11:*:*:*:*:*:*:*
veeamveeam_backup_\&_replication10cpe:2.3:a:veeam:veeam_backup_\&_replication:10:*:*:*:*:*:*:*
veeamveeam_backup_\&_replication9.5cpe:2.3:a:veeam:veeam_backup_\&_replication:9.5:*:*:*:*:*:*:*

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.083

Percentile

94.4%