CVE-2024-29851
https://notcve.org/view.php?id=CVE-2024-29851
Veeam Backup Enterprise Manager allows high-privileged users to steal NTLM hash of Enterprise manager service account. Veeam Backup Enterprise Manager permite a los usuarios con altos privilegios robar el hash NTLM de la cuenta de servicio de Enterprise Manager. • https://veeam.com/kb4581 • CWE-294: Authentication Bypass by Capture-replay •
CVE-2024-29852
https://notcve.org/view.php?id=CVE-2024-29852
Veeam Backup Enterprise Manager allows high-privileged users to read backup session logs. Veeam Backup Enterprise Manager permite a los usuarios con altos privilegios leer registros de sesiones de respaldo. • https://veeam.com/kb4581 • CWE-280: Improper Handling of Insufficient Permissions or Privileges •
CVE-2024-29850
https://notcve.org/view.php?id=CVE-2024-29850
Veeam Backup Enterprise Manager allows account takeover via NTLM relay. Veeam Backup Enterprise Manager permite la adquisición de cuentas a través de retransmisión NTLM. • https://veeam.com/kb4581 • CWE-294: Authentication Bypass by Capture-replay •
CVE-2024-29849 – Veeam Backup Enterprise Manager Authentication Bypass
https://notcve.org/view.php?id=CVE-2024-29849
Veeam Backup Enterprise Manager allows unauthenticated users to log in as any user to enterprise manager web interface. Veeam Backup Enterprise Manager permite a los usuarios no autenticados iniciar sesión como cualquier usuario en la interfaz web del administrador empresarial. • https://github.com/sinsinology/CVE-2024-29849 https://veeam.com/kb4581 • CWE-287: Improper Authentication •
CVE-2024-29212
https://notcve.org/view.php?id=CVE-2024-29212
Due to an unsafe de-serialization method used by the Veeam Service Provider Console(VSPC) server in communication between the management agent and its components, under certain conditions, it is possible to perform Remote Code Execution (RCE) on the VSPC server machine. Debido a un método de deserialización inseguro utilizado por el servidor Veeam Service Provider Console (VSPC) en la comunicación entre el agente de administración y sus componentes, bajo ciertas condiciones, es posible realizar la ejecución remota de código (RCE) en la máquina del servidor VSPC. • https://www.veeam.com/kb4575 • CWE-502: Deserialization of Untrusted Data •