Improper Auth: Veeam Backup for Google Cloud v1.0/3.0 Bypass
CVE-2022-43549 Published on December 5, 2022
Improper authentication in Veeam Backup for Google Cloud v1.0 and v3.0 allows attackers to bypass authentication mechanisms.
Vulnerability Analysis
CVE-2022-43549 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.
Weakness Type
What is an authentification Vulnerability?
When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
CVE-2022-43549 has been classified to as an authentification vulnerability or weakness.
Products Associated with CVE-2022-43549
Want to know whenever a new CVE is published for Veeam Backup For Google Cloud? stack.watch will email you.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.