Veeam Security Advisory CVE-2022-26504
Concerning Backup & Replication component used for Microsoft System Center Virtual Machine Manager integration allows domain users to execute malicious code remotely.
This is a Press Release edited by StorageNewsletter.com on March 24, 2022 at 2:01 pmVeeam Software, Inc. had published a security advisory concerning Veeam Backup & Replication.
KB ID: 4290
Product: Veeam Backup & Replication | 9.5 | 10 | 11
Published: 2022-03-12
Last modified: 2022-03-12
Challenge
Vulnerability (CVE-2022-26504) in Veeam Backup & Replication component used for Microsoft System Center Virtual Machine Manager (SCVMM) integration allows domain users to execute malicious code remotely. This may lead to gaining control over the target system.
Severity: High
CVSS v3 score: 8.8
Cause
The vulnerable process Veeam.Backup.PSManager.exe (TCP 8732 by default) allows authentication using non-administrative domain credentials. A remote attacker may use the vulnerable component to execute arbitrary code.
NOTE: The default Veeam Backup & Replication installation is not vulnerable to this issue. Only Veeam Backup & Replication installations with an SCVMM server registered are vulnerable.
Solution
Patches are available for the following Veeam Backup & Replication versions:
Notes:
- The patch must be installed on the Veeam Backup & Replication server.
- All new deployments of Veeam Backup & Replication versions 11 and 10 installed using the ISO images dated 20220302 or later are not vulnerable.