Veeam Recovery Orchestrator JWT Secret Leak Bypass Auth
CVE-2024-29855 Published on June 11, 2024
Hard-coded JWT secret allows authentication bypass in Veeam Recovery Orchestrator
Weakness Type
Use of Hard-coded Credentials
The software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
Products Associated with CVE-2024-29855
Want to know whenever a new CVE is published for Veeam Recovery Orchestrator? stack.watch will email you.
Affected Versions
Veeam Recovery Orchestrator:- Version 7.1.0.230 and below 7.1.0.230 is affected.
- Version 7.0.0.379 and below 7.0.0.379 is affected.
- Version 7.1.0.230 is affected.
- Version 7.0.0.379 is affected.
Exploit Probability
EPSS
19.46%
Percentile
95.27%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.