A deserialization of untrusted data vulnerability with a malicious payload can allow an unauthenticated remote code execution (RCE).
References
| Link | Resource |
|---|---|
| https://www.veeam.com/kb4649 | Vendor Advisory |
| https://labs.watchtowr.com/veeam-backup-response-rce-with-auth-but-mostly-without-auth-cve-2024-40711-2/ | Exploit Third Party Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-40711 |
Configurations
History
21 Oct 2025, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:20
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:20
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
20 Dec 2024, 16:35
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://labs.watchtowr.com/veeam-backup-response-rce-with-auth-but-mostly-without-auth-cve-2024-40711-2/ - Exploit, Third Party Advisory |
Information
Published : 2024-09-07 17:15
Updated : 2025-10-21 23:16
NVD link : CVE-2024-40711
Mitre link : CVE-2024-40711
CVE.ORG link : CVE-2024-40711
JSON object : View
Products Affected
veeam
- veeam_backup_\&_replication
CWE
CWE-502
Deserialization of Untrusted Data
