Veeam Backup & Replication Remote Agent Privilege Escalation Vulnerability
CVE-2024-42452 Published on December 4, 2024

A vulnerability in Veeam Backup & Replication allows a low-privileged user to start an agent remotely in server mode and obtain credentials, effectively escalating privileges to system-level access. This allows the attacker to upload files to the server with elevated privileges. The vulnerability exists because remote calls bypass permission checks, leading to full system compromise.

NVD

Weakness Type

What is an AuthZ Vulnerability?

The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.

CVE-2024-42452 has been classified to as an AuthZ vulnerability or weakness.


Products Associated with CVE-2024-42452

Want to know whenever a new CVE is published for Veeam Backup Replication? stack.watch will email you.

 

Affected Versions

Veeam Backup & Replication: veeam agent:

Exploit Probability

EPSS
0.08%
Percentile
23.21%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.