First published: Wed Dec 04 2024(Updated: )
A vulnerability in Veeam Backup & Replication allows a low-privileged user to connect to remoting services and exploit insecure deserialization by sending a serialized temporary file collection. This exploit allows the attacker to delete any file on the system with service account privileges. The vulnerability is caused by an insufficient blacklist during the deserialization process.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Veeam | ||
Veeam Backup & Replication | >=12.0.0.1402<12.3.0.310 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-42455 is considered a high severity vulnerability due to its potential impact on system integrity by allowing file deletion with elevated privileges.
To mitigate CVE-2024-42455, ensure you apply the latest patches and updates provided by Veeam for Backup & Replication.
CVE-2024-42455 affects systems running Veeam Backup & Replication with remoting services enabled.
Yes, a low-privileged user can exploit CVE-2024-42455 to execute insecure deserialization and potentially delete files.
The implications of CVE-2024-42455 include unauthorized deletion of critical files, which can lead to data loss and service disruption.