Veeam Backup Enterprise Manager (VBEM) users are cautioned to address a critical security vulnerability that enables unauthorized access to any account. This flaw, rated with a CVSS base score of 9.8/10, poses a significant risk to affected systems. While VBEM isn’t enabled by default, Veeam advises prompt action to mitigate the CVE-2024-29849 vulnerability. Users unable to upgrade immediately can stop and disable services associated with VBEM or uninstall the software if not in use.
Additionally, Veeam has patched two high-severity vulnerabilities within VBEM, including one allowing account takeover via NTLM relay and another enabling high-privileged users to steal NTLM hashes. These proactive measures aim to fortify the security posture of Veeam’s software suite amidst evolving cyber threats. Notably, past vulnerabilities in Veeam products have been exploited in ransomware attacks, highlighting the importance of timely patching and proactive security measures.
In March 2023, Veeam addressed a high-severity vulnerability in Backup & Replication software that was exploited by the FIN7 threat group in ransomware operations. Subsequent attacks by Cuba ransomware affiliates targeted critical infrastructure and IT companies, underscoring the urgency of addressing vulnerabilities promptly. Veeam’s swift response to security issues demonstrates its commitment to safeguarding customers’ data and infrastructure integrity in a landscape rife with cyber threats.
As a trusted provider of backup and replication solutions to over 450,000 customers worldwide, including major corporations, Veeam plays a vital role in ensuring data protection and business continuity. By proactively addressing security vulnerabilities and releasing timely patches, Veeam aims to bolster the resilience of its products against emerging threats, ultimately enhancing customer trust and confidence in their data protection solutions.