First published: Tue Nov 07 2023(Updated: )
A vulnerability in Veeam ONE allows an unprivileged user who has access to the Veeam ONE Web Client the ability to acquire the NTLM hash of the account used by the Veeam ONE Reporting Service. Note: The criticality of this vulnerability is reduced as it requires interaction by a user with the Veeam ONE Administrator role.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Veeam ONE | =11.0.0.1379 | |
Veeam ONE | =11.0.1.1880 | |
Veeam ONE | =12.0.0.2498 | |
Veeam ONE | =12.0.1.2591 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38549 is a vulnerability in Veeam ONE that allows an unprivileged user to acquire the NTLM hash of the account used by the Veeam ONE Reporting Service.
CVE-2023-38549 affects Veeam ONE versions 11.0.0.1379, 11.0.1.1880, 12.0.0.2498, and 12.0.1.2591.
CVE-2023-38549 has a severity score of 5.4 (medium).
To fix CVE-2023-38549, update Veeam ONE to the latest version available and follow the recommendations provided in the Veeam KB4508 article (link provided).
CWE-79 is a Common Weakness Enumeration category for Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').