Show filters
63 Total Results
Displaying 1-10 of 63
Sort by:
Attacker Value
High
CVE-2023-27532
Disclosure Date: March 10, 2023 (last updated May 10, 2024)
Vulnerability in Veeam Backup & Replication component allows encrypted credentials stored in the configuration database to be obtained. This may lead to gaining access to the backup infrastructure hosts.
11
Attacker Value
Moderate
CVE-2023-38548
Disclosure Date: November 07, 2023 (last updated December 22, 2024)
A vulnerability in Veeam ONE allows an unprivileged user who has access to the Veeam ONE Web Client the ability to acquire the NTLM hash of the account used by the Veeam ONE Reporting Service.
8
Attacker Value
Very High
CVE-2024-40711
Disclosure Date: September 07, 2024 (last updated October 19, 2024)
A deserialization of untrusted data vulnerability with a malicious payload can allow an unauthenticated remote code execution (RCE).
2
Attacker Value
Unknown
CVE-2023-38547
Disclosure Date: November 07, 2023 (last updated November 15, 2023)
A vulnerability in Veeam ONE allows an unauthenticated user to gain information about the SQL server connection Veeam ONE uses to access its configuration database. This may lead to remote code execution on the SQL server hosting the Veeam ONE configuration database.
3
Attacker Value
Moderate
CVE-2024-29212
Disclosure Date: May 14, 2024 (last updated May 15, 2024)
Due to an unsafe de-serialization method used by the Veeam Service Provider Console(VSPC) server in communication between the management agent and its components, under certain conditions, it is possible to perform Remote Code Execution (RCE) on the VSPC server machine.
1
Attacker Value
Unknown
CVE-2024-40715
Disclosure Date: November 07, 2024 (last updated November 08, 2024)
A vulnerability in Veeam Backup & Replication Enterprise Manager has been identified, which allows attackers to perform authentication bypass. Attackers must be able to perform Man-in-the-Middle (MITM) attack to exploit this vulnerability.
1
Attacker Value
High
CVE-2020-10915 Preauth RCE in VEEAM One Agent
Disclosure Date: April 22, 2020 (last updated November 27, 2024)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of VEEAM One Agent 9.5.4.4587. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HandshakeResult method. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-10401.
0
Attacker Value
Unknown
CVE-2020-10914
Disclosure Date: April 22, 2020 (last updated November 27, 2024)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of VEEAM One Agent 9.5.4.4587. Authentication is not required to exploit this vulnerability. The specific flaw exists within the PerformHandshake method. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-10400.
0
Attacker Value
Unknown
CVE-2025-23114
Disclosure Date: February 05, 2025 (last updated February 05, 2025)
A vulnerability in Veeam Updater component allows Man-in-the-Middle attackers to execute arbitrary code on the affected server. This issue occurs due to a failure to properly validate TLS certificate.
0
Attacker Value
Unknown
CVE-2025-23082
Disclosure Date: January 14, 2025 (last updated January 14, 2025)
Veeam Backup for Microsoft Azure is vulnerable to Server-Side Request Forgery (SSRF). This may allow an unauthenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.
0