Lucene search

K
veeamVeeam softwareVEEAM:KB4289
HistoryMar 12, 2022 - 12:00 a.m.

CVE-2022-26503

2022-03-1200:00:00
Veeam software
www.veeam.com
25
vulnerability
veeam agent
microsoft windows
local privilege escalation
arbitrary code
local system privileges

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

High

EPSS

0

Percentile

12.7%

Challenge

Vulnerability (CVE-2022-26503) in Veeam Agent for Microsoft Windows allows local privilege escalation. An attacker who successfully exploited this vulnerability could run arbitrary code with LOCAL SYSTEM privileges.

Severity: High CVSS v3 score: 7.8

Cause

Veeam Agent for Microsoft Windows uses Microsoft .NET data serialization mechanisms. A local user may send malicious code to the network port opened by Veeam Agent for Microsoft Windows Service (TCP 9395 by default), which will not be deserialized properly.

Solution

This vulnerability is fixed in the following Veeam Agent for Microsoft Windows patched releases:

Notes:

  • For standalone Veeam Agent for Microsoft Windows deployments, the patched release must be installed manually on each machine.
  • For Veeam Agent for Microsoft Windows deployments managed by Veeam Backup & Replication, the update can be performed from the Veeam Backup & Replication Console after installing the corresponding Veeam Backup & Replication cumulative patches ( 10a | 11a ).

If a Auto-update backup agent is enabled, the Veeam Agent for Microsoft Windows deployments will be updated automatically. Otherwise, the update must be manually triggered in the Veeam Backup & Replication console.

  • If you are using a version of Veeam Agent for Microsoft Windows prior to 4, please upgrade to a supported version.

More Information

This vulnerability was reported by Nikita Petrov (Positive Technologies).

To submit feedback regarding this article, please click this link: Send Article Feedback
To report a typo on this page, highlight the typo with your mouse and press CTRL + Enter.

Affected configurations

Vulners
Node
veeamveeam_backup_for_google_cloudMatch5.0
OR
veeamveeam_backup_for_google_cloudMatch4.0
OR
veeamveeam_backup_for_google_cloudMatch3.0.2
OR
veeamveeam_backup_for_google_cloudMatch2.2
OR
veeamveeam_backup_for_google_cloudMatch2.1
OR
veeamveeam_backup_for_google_cloudMatch2.0
VendorProductVersionCPE
veeamveeam_backup_for_google_cloud5.0cpe:2.3:a:veeam:veeam_backup_for_google_cloud:5.0:*:*:*:*:*:*:*
veeamveeam_backup_for_google_cloud4.0cpe:2.3:a:veeam:veeam_backup_for_google_cloud:4.0:*:*:*:*:*:*:*
veeamveeam_backup_for_google_cloud3.0.2cpe:2.3:a:veeam:veeam_backup_for_google_cloud:3.0.2:*:*:*:*:*:*:*
veeamveeam_backup_for_google_cloud2.2cpe:2.3:a:veeam:veeam_backup_for_google_cloud:2.2:*:*:*:*:*:*:*
veeamveeam_backup_for_google_cloud2.1cpe:2.3:a:veeam:veeam_backup_for_google_cloud:2.1:*:*:*:*:*:*:*
veeamveeam_backup_for_google_cloud2.0cpe:2.3:a:veeam:veeam_backup_for_google_cloud:2.0:*:*:*:*:*:*:*

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

High

EPSS

0

Percentile

12.7%