First published: Wed Apr 22 2020(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Veeam ONE. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HandshakeResult method. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Veeam ONE | ||
Veeam ONE | =9.5.4.4587 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Veeam ONE vulnerability is CVE-2020-10915.
CVE-2020-10915 has a severity rating of 9.8 (Critical).
The CVE-2020-10915 vulnerability allows remote attackers to execute arbitrary code on affected installations of VEEAM One Agent 9.5.4.4587.
No, authentication is not required to exploit CVE-2020-10915.
To fix the CVE-2020-10915 vulnerability, ensure that you have installed the latest security updates from Veeam and follow the recommended mitigation steps provided by the vendor.