CVE-2024-29851
CVE-2024-29851: Veeam Backup Enterprise Manager NTLM hash theft vulnerability. High-privileged users can steal the NTLM hash of the Enterprise Manager service account. Despite a CVSS score of 0, SOCRadar's Vulnerability Risk Score (SVRS) is 30, indicating a low to medium risk. This privilege escalation vulnerability could allow malicious high-privileged users to compromise the Enterprise Manager service account, leading to unauthorized access and potential data breaches. The CWE-294 indicates improper validation of cryptographic signature. While the SVRS suggests it's not immediately critical, monitoring and patching are recommended, especially given the "In The Wild" tag, which suggests this exploit is actively being used. Addressing this flaw mitigates the risk of unauthorized access to sensitive data managed by Veeam Backup Enterprise Manager.
Description
CVE-2024-29851 is a vulnerability in Veeam Backup Enterprise Manager that allows high-privileged users to steal the NTLM hash of the Enterprise manager service account. This vulnerability is rated as 7.2 on the CVSS scale and has a SOCRadar Vulnerability Risk Score (SVRS) of 30, indicating a moderate risk.
Key Insights
- High-privileged users can exploit this vulnerability to gain access to sensitive information. The NTLM hash is a cryptographic hash of the user's password, which can be used to authenticate to other systems. This could allow attackers to gain access to other systems within the network, including servers and databases.
- The vulnerability is actively exploited in the wild. This means that attackers are actively using this vulnerability to target systems.
- The Cybersecurity and Infrastructure Security Agency (CISA) has warned of the vulnerability, calling for immediate and necessary measures. This indicates that CISA believes this vulnerability is a serious threat to organizations.
Mitigation Strategies
- Update Veeam Backup Enterprise Manager to the latest version. Veeam has released a patch that addresses this vulnerability.
- Restrict access to the Veeam Backup Enterprise Manager console to only authorized users. This will help to prevent unauthorized users from exploiting this vulnerability.
- Enable two-factor authentication for access to the Veeam Backup Enterprise Manager console. This will add an extra layer of security to help protect against unauthorized access.
- Monitor your systems for any suspicious activity. If you detect any suspicious activity, you should investigate immediately.
Additional Information
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.