CVE-2024-29851
https://notcve.org/view.php?id=CVE-2024-29851
Veeam Backup Enterprise Manager allows high-privileged users to steal NTLM hash of Enterprise manager service account. Veeam Backup Enterprise Manager permite a los usuarios con altos privilegios robar el hash NTLM de la cuenta de servicio de Enterprise Manager. • https://veeam.com/kb4581 • CWE-294: Authentication Bypass by Capture-replay •
CVE-2024-29853
https://notcve.org/view.php?id=CVE-2024-29853
An authentication bypass vulnerability in Veeam Agent for Microsoft Windows allows for local privilege escalation. Una vulnerabilidad de omisión de autenticación en Veeam Agent para Microsoft Windows permite la escalada de privilegios locales. • https://veeam.com/kb4582 • CWE-288: Authentication Bypass Using an Alternate Path or Channel •
CVE-2024-29852
https://notcve.org/view.php?id=CVE-2024-29852
Veeam Backup Enterprise Manager allows high-privileged users to read backup session logs. Veeam Backup Enterprise Manager permite a los usuarios con altos privilegios leer registros de sesiones de respaldo. • https://veeam.com/kb4581 • CWE-280: Improper Handling of Insufficient Permissions or Privileges •
CVE-2024-29850
https://notcve.org/view.php?id=CVE-2024-29850
Veeam Backup Enterprise Manager allows account takeover via NTLM relay. Veeam Backup Enterprise Manager permite la adquisición de cuentas a través de retransmisión NTLM. • https://veeam.com/kb4581 • CWE-294: Authentication Bypass by Capture-replay •
CVE-2024-29849 – Veeam Backup Enterprise Manager Authentication Bypass
https://notcve.org/view.php?id=CVE-2024-29849
Veeam Backup Enterprise Manager allows unauthenticated users to log in as any user to enterprise manager web interface. Veeam Backup Enterprise Manager permite a los usuarios no autenticados iniciar sesión como cualquier usuario en la interfaz web del administrador empresarial. • https://github.com/sinsinology/CVE-2024-29849 https://veeam.com/kb4581 • CWE-287: Improper Authentication •