Veeam patches critical security flaw

Share post:

Veeam Software has patched CVE-2023-27532, a critical security flaw in its widely used Veeam Backup & Replication solution and urges customers to apply the fix as soon as possible.

“This affects all Veeam Backup & Replication versions. We have developed patches for V11 and V12 to mitigate this vulnerability and we recommend you update your installations immediately” Veeam told customers, saying that the bug, CVE-2023-27532, was reported via its vulnerability disclosure programme.

In an email notifying user of the flaw and the need to patch, Veeam said, “If you use an all-in-one Veeam appliance with no remote backup infrastructure components, you can also block external connections to port TCP 9401 in the backup server firewall as a temporary remediation until the patch is installed.”

Shanigen, a security researcher, reported the flaw in mid-February, and it affects all Veeam Backup & Replication (VBR) versions. It enables an unauthenticated user to request encrypted credentials, potentially granting access to backup infrastructure hosts. After obtaining encrypted credentials from the VeeamVBR configuration database, unauthenticated attackers can use it to gain access to backup infrastructure hosts.

The root cause of this flaw, according to Veeam’s advisory, is the Veeam.Backup.Service.exe (which by default runs on TCP 9401), which allows unauthenticated users to request encrypted credentials. Veeam then released a patch to address the vulnerability in builds 12 (build 12.0.0.1420 P20230223) and 11a (build 11.0.1.1261 P20230227).

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday May 17, 2024

Welcome to Cyber Security Today. This is the Week in Review for the week ending Friday, May 17th,...

Cyber Security Today, May 17, 2024 – Malware hiding in Apache Tomcat servers

Malware hiding in Apache Tomcat servers, new backdoors found, and more Welcome to Cyber Security Today. It's Friday, May...

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Cyber Security Today, May 15, 2024 – Ebury botnet still exploits Linux servers, Microsoft, SAP and Apple issue security updates

The Ebury botnet continues to exploit Linux servers, Microsoft, SAP and Apple issue security updates, and more. Welcome to...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways