Veeam Service Provider Console (VSPC) has been found to have two critical vulnerabilities that could allow Remote Code Execution (RCE). These vulnerabilities are present in versions 7.x and 8.x of the VSPC, though a Common Vulnerabilities and Exposures (CVE) identifier has not yet been assigned. The vulnerabilities arise from an unsafe deserialization method in the server communication between the management agent and its associated components. This flaw can be exploited under specific conditions, enabling threat actors to execute arbitrary code on the VSPC server.
In response, Veeam has issued patches in the latest releases to address these RCE vulnerabilities. The updates also include numerous bug fixes and enhancements such as new alarm triggers, improved public cloud integration, and enhanced backup capabilities for Microsoft 365. VSPC users are advised to verify their software version before applying the cumulative patch, especially for version 8 (build 8.0.0.16877), which requires checking through the backup portal under Configuration > Support. For VSPC 7 users, it is noted that the patch addresses the RCE issue but does not include private fixes made after the release of P20230531 (7.0.0.14271).
Furthermore, Veeam has announced that VSPC 7 reached its end-of-fix status in December 2023, urging users to upgrade to the latest versions to ensure security and functionality. The patched vulnerabilities highlight the importance of regular updates and vigilant cybersecurity practices to protect against exploitation by threat actors. Organizations using VSPC should prioritize applying these patches to mitigate potential risks.
In summary, the discovery of these RCE flaws in Veeam Service Provider Console underscores the critical need for timely software updates and adherence to security advisories. By addressing these vulnerabilities promptly, Veeam has taken steps to enhance the security and reliability of its products, providing users with the necessary tools to safeguard their systems against sophisticated cyber threats.