CVE-2024-39714
https://notcve.org/view.php?id=CVE-2024-39714
A code injection vulnerability that permits a low-privileged user to upload arbitrary files to the server, leading to remote code execution on VSPC server. • https://www.veeam.com/kb4649 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2024-40710
https://notcve.org/view.php?id=CVE-2024-40710
A series of related high-severity vulnerabilities, the most notable enabling remote code execution (RCE) as the service account and extraction of sensitive information (savedcredentials and passwords). Exploiting these vulnerabilities requires a user who has been assigned a low-privileged role within Veeam Backup & Replication. • https://www.veeam.com/kb4649 • CWE-522: Insufficiently Protected Credentials •
CVE-2024-39718
https://notcve.org/view.php?id=CVE-2024-39718
An improper input validation vulnerability that allows a low-privileged user to remotely remove files on the system with permissions equivalent to those of the service account. • https://www.veeam.com/kb4649 •
CVE-2024-42019
https://notcve.org/view.php?id=CVE-2024-42019
A vulnerability that allows an attacker to access the NTLM hash of the Veeam Reporter Service service account. This attack requires user interaction and data collected from Veeam Backup & Replication. • https://www.veeam.com/kb4649 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2024-29855 – Veeam Recovery Orchestrator Authentication Bypass
https://notcve.org/view.php?id=CVE-2024-29855
Hard-coded JWT secret allows authentication bypass in Veeam Recovery Orchestrator El secreto JWT codificado permite omitir la autenticación en Veeam Recovery Orchestrator • https://github.com/sinsinology/CVE-2024-29855 https://www.veeam.com/kb4585 •