Lucene search

K
veeamVeeam softwareVEEAM:KB4376
HistoryNov 04, 2022 - 12:00 a.m.

Access to Hyper-V or Veeam B&R Components Fails After DCOM Hardening is Enabled

2022-11-0400:00:00
Veeam software
www.veeam.com
21
hyper-v
veeam
dcom hardening
kb5004442

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

4.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N

AI Score

6.9

Confidence

Low


Article Applicability

The issue discussed in this article is not identified solely based on the Veeam errors but rather by their correlation with Windows Event ID# 10036, which states:

The server-side authentication level policy does not allow the user from address <IP> to activate DCOM server.
Please raise the activation authentication level at least to RPC_AUTHN_LEVEL_PKT_INTEGRITY in client application.

The Veeam-level errors mentioned in this article may occur for other reasons. However, if they occur alongside Windows Event ID# 10036, then the underlying cause is DCOM hardening related.

Challenge

After June 14, 2022, DCOM connections to Hyper-V, Veeam Backup & Replication, and other Windows-based servers may be impacted by the DCOM hardening policy activated after the deployment of the Microsoft CVE-2021-26414 security update.

Below are examples of errors that may be shown by Veeam products affected by this:
This list of examples errors is not exhaustive, others may exist. It is critical to focus on checking for Windows Event ID 10036.

  • Veeam Backup & Replication – operations involving Hyper-V infrastructure may fail with the error:

    Failed to call RPC function 'HviCreateVmRecoverySnapshot'
    
    
    Failed to connect to cluster &lt;clustername&gt;
    

    Failed to create Hyper-V Cluster Wmi utils: Access denied or timeout expired.
    Check if you have local administrator privileges on computer ‘<clustername>’.
    Possible reason:
    Specified host is not a cluster node.

    Failed to connect to host vmhost2
    

    Access denied or timeout expired.
    Check if you have local administrator privileges on computer ‘<hostname>’.
    Possible reasons:

    1. Invalid credentials.
    2. Specified host is not a Hyper-V server.

HostError

Reminder: The errors shown in this article can occur for other reasons.
It is their occurrence alongside Window Event ID# 13006 that makes this article applicable.

not a cluster

Reminder: The errors shown in this article can occur for other reasons.
It is their occurrence alongside Window Event ID# 13006 that makes this article applicable.

  • Veeam Agent for Microsoft Windows – connection to Hyper-V infrastructure fails with error:

    Failed to connect to cluster 'CLUSTERNAME.contoso.com'.
    
  • Veeam ONE – connection to Hyper-V and Veeam Backup & Replication infrastructures fails with the error:

    System.UnauthorizedAccessException:'Access denied. (Exception from HRESULT : 0x80070005 (E_ACCESSDENIED))'
    
  • Veeam Recovery Orchestrator – connection to Veeam Backup & Replication fails with the error:

    Failed to connect to the server. Specified user is invalid or does not have enough permissions on the server.
    

Cause

The situation is caused by the Microsoft Windows DCOM connections hardening. Shown below is Microsoft’s timeline for deployment of this new hardening policy.

Update Release Behavioral Change
June 8, 2021 Hardening changes are disabled by default but with the ability to enable them using a registry key.
June 14, 2022 Hardening changes are enabled by default but with the ability to disable them using a registry key.
March 14, 2023 Hardening changes are enabled with no ability to disable them. By this point, you must resolve any compatibility issues with the hardening changes and applications in your environment.

__

Swipe to show more of the table

__

All Veeam products are prepared for this change and utilize Packet Integrity DCOM authentication level.

However, if the underlying Windows operating systems do not have the necessary security updates, this can lead to different authentication levels being used for DCOM connections, resulting in authentication failures. For instance, one Windows machine may have the hardening changes disabled due to the absence of the installed update, while another Windows machine may have the DCOM hardening enabled because the update is installed. When these DCOM authentication failures occur, Event #10036 will appear, displaying the following message:

Please raise the activation authentication level at least to RPC_C_AUTHN_LEVEL_PKT_INTEGRITY in client application

Event 10036 Example

This PowerShell command can be run to quickly check for occurrences of Event ID# 10036 within the System event logs:

Get-WinEvent -FilterHashtable @{LogName='System'; ID=10036}

Copy

Solution

All Veeam products are ready for this DCOM change and use Packet Integrity DCOM authentication; the underlying Windows OS must be updated to support this change.

To resolve these issues, ensure all Windows-based servers have installed the DCOM Hardening update. See the list at the bottom of this article: KB5004442–Manage changes for Windows DCOM Server Security Feature Bypass (CVE-2021-26414).
The updates listed on that page may have been rolled in to future updates, check Windows DCOM Server Security Feature Bypass CVE-2021-26414 for more information.

Notes:

  • These updates may be listed as optional and may have been ignored by Windows or WSUS systems. In such a situation, the update must be deployed manually.
  • This issue may affect older Windows operating system, but the update to resolve the issue may not be available without ESU.
  • For environments where Veeam Backup & Replication was deployed on an older operating system no longer supported by the latest version of Veeam Backup & Replication (e.g., Server 2008 R2), please review: KB1803: How to Upgrade Legacy Veeam Backup Server

To submit feedback regarding this article, please click this link: Send Article Feedback
To report a typo on this page, highlight the typo with your mouse and press CTRL + Enter.

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

4.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N

AI Score

6.9

Confidence

Low