Veeam patches critical flaws, urges users to update

The most concerning glitch affects VBR software

Data protection company Veeam Software has released security updates to address a total of 18 vulnerabilities affecting its products, including Veeam Backup & Replication (VBR), Service Provider Console, and Veeam ONE.

Among all the flaws addressed, five are classified as critical, with the potential for remote code execution (RCE).

The most concerning of them is the bug, tracked as CVE-2024-40711, affecting VBR software version 12.1.2.172 and earlier.

The flaw has been assigned CVSS v3.1 score of 9.8 out of 10, indicating extreme risk. It could enable an attacker to exploit the system without requiring authentication, potentially leading to full system compromise.

In recent years, ransomware groups have targeted VBR vulnerabilities, exploiting them to steal backups and encrypt data, leaving organisations without the ability to recover.

Veeam urges users to install VBR version 12.2.0.334 immediately to avoid potential exploitation.

This security issue was reported by Florian Hauser with CODE WHITE GmbH, Veeam disclosed.

The other four critical vulnerabilities addressed by the company include:

Veeam has released patches for these critical vulnerabilities.

Users of Veeam ONE should upgrade to version 12.2.0.4093, and those using the Veeam Service Provider Console should install version 8.1.0.21377 to protect against exploitation.

Alongside these critical vulnerabilities, the latest security update also fixes 13 other high-severity flaws, which could result in privilege escalation, bypassing multi-factor authentication, and code execution with elevated privileges.

Veeam has released updates to address all high-severity flaws.

The company has not disclosed whether any of these vulnerabilities have been exploited in the wild.

However, given the severity of these vulnerabilities and the potential for exploitation by threat actors, the company strongly urges users to update their software to the latest versions as soon as possible to protect their systems from potential attacks.

"Unsupported product versions are not tested, but are likely affected and should be considered vulnerable," Veeam warned.