First published: Wed Dec 04 2024(Updated: )
A vulnerability in Veeam Backup & Replication platform allows a low-privileged user with a specific role to exploit a method that updates critical configuration settings, such as modifying the trusted client certificate used for authentication on a specific port. This can result in unauthorized access, enabling the user to call privileged methods and initiate critical services. The issue arises due to insufficient permission requirements on the method, allowing users with low privileges to perform actions that should require higher-level permissions.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Veeam | ||
Veeam Backup & Replication | >=12.0.0.1402<12.3.0.310 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-42456 is considered a critical vulnerability due to the potential for unauthorized access to sensitive configuration settings.
To fix CVE-2024-42456, update to the latest version of Veeam Backup & Replication that addresses this vulnerability.
Veeam Backup & Replication users with low-privileged roles may be affected by CVE-2024-42456.
CVE-2024-42456 allows an attacker to modify critical configuration settings, potentially allowing unauthorized users to access the system.
CVE-2024-42456 was disclosed in 2024, highlighting the vulnerabilities in specific methods within Veeam Backup & Replication.