CVE-2024-42451

A vulnerability in Veeam Backup & Replication allows low-privileged users to leak all saved credentials in plaintext. This is achieved by calling a series of methods over an external protocol, ultimately retrieving the credentials using a malicious setup on the attacker's side. This exposes sensitive data, which could be used for further attacks, including unauthorized access to systems managed by the platform.
References
Link Resource
https://www.veeam.com/kb4693 Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:veeam:veeam_backup_\&_replication:*:*:*:*:*:*:*:*

History

24 Apr 2025, 17:20

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.7
v2 : unknown
v3 : 6.5
References () https://www.veeam.com/kb4693 - () https://www.veeam.com/kb4693 - Vendor Advisory
CPE cpe:2.3:a:veeam:veeam_backup_\&_replication:*:*:*:*:*:*:*:*
First Time Veeam
Veeam veeam Backup \& Replication

Information

Published : 2024-12-04 02:15

Updated : 2025-04-24 17:20


NVD link : CVE-2024-42451

Mitre link : CVE-2024-42451

CVE.ORG link : CVE-2024-42451


JSON object : View

Products Affected

veeam

  • veeam_backup_\&_replication
CWE
CWE-312

Cleartext Storage of Sensitive Information

CWE-863

Incorrect Authorization