A vulnerability in Veeam Backup & Replication allows low-privileged users to leak all saved credentials in plaintext. This is achieved by calling a series of methods over an external protocol, ultimately retrieving the credentials using a malicious setup on the attacker's side. This exposes sensitive data, which could be used for further attacks, including unauthorized access to systems managed by the platform.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.veeam.com/kb4693 | Vendor Advisory | 
Configurations
                    History
                    24 Apr 2025, 17:20
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 6.5 | 
| References | () https://www.veeam.com/kb4693 - Vendor Advisory | |
| CPE | cpe:2.3:a:veeam:veeam_backup_\&_replication:*:*:*:*:*:*:*:* | |
| First Time | Veeam Veeam veeam Backup \& Replication | 
Information
                Published : 2024-12-04 02:15
Updated : 2025-04-24 17:20
NVD link : CVE-2024-42451
Mitre link : CVE-2024-42451
CVE.ORG link : CVE-2024-42451
JSON object : View
Products Affected
                veeam
- veeam_backup_\&_replication
