CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-29852

Medium Severity
SVRS
30/100

CVSSv3
NA/10

EPSS
0.00187/1

CVE-2024-29852 allows privileged users within Veeam Backup Enterprise Manager to access and read backup session logs. This vulnerability exposes sensitive data contained within these logs. With an SVRS score of 30, while not critical, it indicates a potential risk that should be monitored. Although the CVSS score is 0, the SOCRadar Vulnerability Risk Score (SVRS) suggests a degree of concern, especially given the "In The Wild" tag. The ability for high-privileged users to read backup logs can lead to information disclosure and potentially further compromise if the logs contain sensitive credentials or configuration details. While immediate action may not be required, a thorough review of access controls and monitoring of user activity is recommended to mitigate the risks associated with CVE-2024-29852. This emphasizes the importance of going beyond CVSS scores when assessing vulnerability risk. The vulnerability's presence "In The Wild" should not be taken lightly.

In The Wild
2024-05-22

2024-05-24
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-29852 is a vulnerability in Veeam Backup Enterprise Manager that allows high-privileged users to read backup session logs. This could allow an attacker to gain access to sensitive information, such as the contents of backups, the names of users who have accessed backups, and the dates and times of backups.

Key Insights

  • The SVRS of 30 indicates that this vulnerability is of low severity and does not require immediate action.
  • The vulnerability is actively exploited in the wild, meaning that attackers are actively using it to target systems.
  • The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning about this vulnerability.

Mitigation Strategies

  • Update Veeam Backup Enterprise Manager to the latest version.
  • Restrict access to backup session logs to only those users who need it.
  • Monitor backup logs for any suspicious activity.

Additional Information

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-29849: Unpatched Veeam Users Vulnerable to Attack
ddos2024-05-23
CVE-2024-29849: Unpatched Veeam Users Vulnerable to Attack | Veeam is urging all users of Veeam Backup Enterprise Manager to update their software to the latest version due to the discovery of a critical vulnerability that allows attackers to bypass authentication safeguards. Veeam... The post CVE-2024-29849: Unpatched Veeam Users Vulnerable to Attack appeared first on InfoTech & InfoSec News.Veeam is urging
meterpreter.org
rss
forum
news
CVE-2024-29852 | Veeam Backup & Replication prior 12.1.2.172 Backup Session Log information disclosure
vuldb.com2024-05-23
CVE-2024-29852 | Veeam Backup & Replication prior 12.1.2.172 Backup Session Log information disclosure | A vulnerability was found in Veeam Backup & Replication. It has been classified as problematic. This affects an unknown part of the component Backup Session Log. The manipulation leads to information disclosure. This vulnerability is uniquely identified as CVE-2024-29852. It is possible to initiate the attack remotely. There is no
cve-2024-29852
ipv4s
domains
urls
Veeam Enterprise Backup Manager Flaw Allows Unauthorized Access
Raga Varshini2024-05-22
Veeam Enterprise Backup Manager Flaw Allows Unauthorized Access | Veeam Backup And Replication is backup software for creating secure backups that enable clean recovery and data resilience. The software replicates VM backups to a secondary location, which will quickly recover from a failover to a replica VM during a potential disaster on the primary site. Veeam has released a new security release information and [&#8230;] The post Veeam Enterprise Backup Manager Flaw Allows Unauthorized Access appeared first on <a
cybersecuritynews.com
rss
forum
news
Critical Veeam Backup Enterprise Manager authentication bypass bug
Pierluigi Paganini2024-05-22
Critical Veeam Backup Enterprise Manager authentication bypass bug | A critical security vulnerability in Veeam Backup Enterprise Manager could allow threat actors to bypass authentication. A critical vulnerability, tracked as CVE-2024-29849 (CVSS score: 9.8), in Veeam Backup Enterprise Manager could allow attackers to bypass authentication. Veeam Backup Enterprise Manager is a centralized management and reporting tool designed to simplify the administration of Veeam Backup &#38; Replication [&#8230;] A critical security vulnerability in Veeam Backup
cve-2024-29850
cve-2024-29852
cve-2024-29849
cve-2024-29851

Social Media

Veeam Backup Enterprise Manager Vulnerabilities (CVE-2024-29849, CVE-2024-29850, CVE-2024-29851, CVE-2024-29852) #PatchManagement https://t.co/Br29Y0mlqk
0
0
0
CVE-2024-29852 Veeam Backup Enterprise Manager allows high-privileged users to read backup session logs. https://t.co/wi2WCMxm3x
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://veeam.com/kb4581

CWE Details

No CWE details found for this CVE

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence