Lucene search

K
veeamVeeam softwareVEEAM:KB4290
HistoryMar 12, 2022 - 12:00 a.m.

CVE-2022-26504

2022-03-1200:00:00
Veeam software
www.veeam.com
18
vulnerability
veeam backup
replication
scvmm
remote code execution
control gain
software

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.001

Percentile

44.6%

Challenge

Vulnerability (CVE-2022-26504) in Veeam Backup & Replication component used for Microsoft System Center Virtual Machine Manager (SCVMM) integration allows domain users to execute malicious code remotely. This may lead to gaining control over the target system.

Severity: High CVSS v3 score: 8.8

Cause

The vulnerable process Veeam.Backup.PSManager.exe (TCP 8732 by default) allows authentication using non-administrative domain credentials. A remote attacker may use the vulnerable component to execute arbitrary code.

**NOTE:**The default Veeam Backup & Replication installation is not vulnerable to this issue. Only Veeam Backup & Replication installations with an SCVMM server registered are vulnerable.

Solution

Patches are available for the following Veeam Backup & Replication versions:

Notes:

  • The patch must be installed on the Veeam Backup & Replication server.
  • All new deployments of Veeam Backup & Replication versions 11 and 10 installed using the ISO images dated 20220302 or later are not vulnerable.

To submit feedback regarding this article, please click this link: Send Article Feedback
To report a typo on this page, highlight the typo with your mouse and press CTRL + Enter.

Affected configurations

Vulners
Node
veeamveeam_backup_\&_replicationMatch11
OR
veeamveeam_backup_\&_replicationMatch10
OR
veeamveeam_backup_\&_replicationMatch9.5
VendorProductVersionCPE
veeamveeam_backup_\&_replication11cpe:2.3:a:veeam:veeam_backup_\&_replication:11:*:*:*:*:*:*:*
veeamveeam_backup_\&_replication10cpe:2.3:a:veeam:veeam_backup_\&_replication:10:*:*:*:*:*:*:*
veeamveeam_backup_\&_replication9.5cpe:2.3:a:veeam:veeam_backup_\&_replication:9.5:*:*:*:*:*:*:*

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.001

Percentile

44.6%