{"id":991176,"date":"2024-10-16T13:45:35","date_gmt":"2024-10-16T13:45:35","guid":{"rendered":"https:\/\/binaryms.co.uk\/?p=991176"},"modified":"2024-10-16T13:58:09","modified_gmt":"2024-10-16T13:58:09","slug":"high-risk-veeam-vulnerability-what-do-you-need-to-know","status":"publish","type":"post","link":"https:\/\/binaryms.co.uk\/index.php\/2024\/10\/16\/high-risk-veeam-vulnerability-what-do-you-need-to-know\/","title":{"rendered":"High risk Veeam vulnerability, what do you need to know?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"991176\" class=\"elementor elementor-991176\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6a09389 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6a09389\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-523d815\" data-id=\"523d815\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"vamtam-has-theme-widget-styles elementor-element elementor-element-9b91692 elementor-widget elementor-widget-text-editor\" data-id=\"9b91692\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"MsoNormal\">A vulnerability has been identified and reported within the Veeam platform, identification for this is CVE-2024-40711. It has been classified as critical. Reported by Florian Hauser with Code White Gmbh the vulnerability is currently under active exploitation.<\/p><p class=\"MsoNormal\">The exploit is being used by ransomware groups to create new local administrator accounts to carry out further attacks off the back of this. This has been classed as RCE exploit which stands for \u2018Remote Code Execution\u2019 and is one of the most serious vulnerabilities.<\/p><p class=\"MsoNormal\">Corporate backup and disaster recovery solutions are one of the biggest targets for attackers usually for some kind of profit gain off the back of a cyber attack.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf0f657 elementor-widget elementor-widget-heading\" data-id=\"cf0f657\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Solution<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"vamtam-has-theme-widget-styles elementor-element elementor-element-76d8e47 elementor-widget elementor-widget-text-editor\" data-id=\"76d8e47\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIt has been told by Veeam that the issue can be resolved by updating Veeam applications to the latest version and should be done so as soon as possible, details can be found at the link below\u2026\n<br \/><br \/>\n<a href=\"https:\/\/www.veeam.com\/kb4649\">https:\/\/www.veeam.com\/kb4649<\/a>\n<br \/><br \/>\nProducts that have been identified are below\u2026\n<ul>\n \t<li>Veeam Backup &amp; Replication<\/li>\n \t<li>Veeam One<\/li>\n \t<li>Veeam Service Provider Console<\/li>\n \t<li>Veeam Agent for Linux<\/li>\n \t<li>Veeam Backup for Nutanix AHV<\/li>\n \t<li>Veeam Backup for Oracle Linux Virtualization Manager and Red<\/li>\n \t<li>Hat Virtualization<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d4f18c elementor-widget elementor-widget-heading\" data-id=\"5d4f18c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Our Customers<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"vamtam-has-theme-widget-styles elementor-element elementor-element-3154515 elementor-widget elementor-widget-text-editor\" data-id=\"3154515\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>If you are one of our customers there is no need to worry, none of our customers are affected by this exploit due to us not using this application for backup and disaster recovery.<\/p><p>If you are not one of our customers but looking for advice on backup and disaster recovery we can help, either book a call with our sales team to discuss further or view our page on the services that we can provide.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-16d2af2 e-grid e-con-boxed e-con e-parent\" data-id=\"16d2af2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"vamtam-has-theme-widget-styles elementor-element elementor-element-7a813b0 elementor-align-right elementor-widget elementor-widget-button\" data-id=\"7a813b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/binaryms.co.uk\/index.php\/solutions\/backups-and-continuity\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Backups &amp; Continuity<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"vamtam-has-theme-widget-styles elementor-element elementor-element-913e597 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"913e597\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/binaryms.co.uk\/index.php\/solutions\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>A vulnerability has been identified and reported within the Veeam platform, identification for this is CVE-2024-40711. It has been classified as critical. Reported by Florian Hauser with Code White Gmbh the vulnerability is currently under active exploitation.<\/p>\n","protected":false},"author":1,"featured_media":991183,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19],"tags":[24,25,28],"class_list":["post-991176","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it","tag-cybersecurity","tag-development","tag-it"],"_links":{"self":[{"href":"https:\/\/binaryms.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/991176","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/binaryms.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/binaryms.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/binaryms.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/binaryms.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=991176"}],"version-history":[{"count":5,"href":"https:\/\/binaryms.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/991176\/revisions"}],"predecessor-version":[{"id":991184,"href":"https:\/\/binaryms.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/991176\/revisions\/991184"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/binaryms.co.uk\/index.php\/wp-json\/wp\/v2\/media\/991183"}],"wp:attachment":[{"href":"https:\/\/binaryms.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=991176"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/binaryms.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=991176"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/binaryms.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=991176"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}