Page 2 of 48 results (0.002 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

An incorrect permission assignment vulnerability allows an attacker to modify product configuration files. • https://www.veeam.com/kb4649 • CWE-284: Improper Access Control •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

A vulnerability that allows an attacker in possession of the Veeam ONE Agent service account credentials to perform remote code execution on the machine where the Veeam ONE Agent is installed. • https://www.veeam.com/kb4649 • CWE-250: Execution with Unnecessary Privileges •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

A missing authorization vulnerability allows a local low-privileged user on the machine to escalate their privileges to root level. • https://www.veeam.com/kb4649 • CWE-862: Missing Authorization •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

A vulnerability that allows a user who has been assigned a low-privileged role within Veeam Backup & Replication to alter Multi-Factor Authentication (MFA) settings and bypass MFA. • https://www.veeam.com/kb4649 • CWE-287: Improper Authentication •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

A deserialization of untrusted data vulnerability with a malicious payload can allow an unauthenticated remote code execution (RCE). • https://github.com/watchtowrlabs/CVE-2024-40711?tab=readme-ov-file https://www.veeam.com/kb4649 • CWE-502: Deserialization of Untrusted Data •