SB2024090643 - Multiple vulnerabilities in Veeam ONE
Published: September 6, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Cross-site scripting (CVE-ID: CVE-2024-42020)
The disclosed vulnerability allows a remote user to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in Reporter Widgets. A remote user can inject and execute arbitrary HTML code in user's browser in context of vulnerable website.
2) Improper access control (CVE-ID: CVE-2024-42022)
The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote user can modify product configuration files.
3) Improper access control (CVE-ID: CVE-2024-42021)
The vulnerability allows a remote user to gain unauthorized access to sensitive information.
The vulnerability exists due to improper access restrictions. A remote user with valid access tokens can obtain saved access credentials.
4) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2024-42023)
The vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions. A remote low-privileged user can remotely execute arbitrary code with Administrator privileges.
5) Information disclosure (CVE-ID: CVE-2024-42019)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to an unspecified error. A remote attacker can obtain the NTLM hash of the Veeam Reporter Service service account when the user interacts with Veeam Backup & Replication.
6) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2024-42024)
The vulnerability allows a remote user to compromise the affected system.
The vulnerability exists due to the application allows remote code execution with service account credentials. A remote attacker with possession of service account credentials can execute arbitrary code on systems with where the Veeam ONE Agent is installed.
Remediation
Install update from vendor's website.