CVE-2024-42455

A vulnerability in Veeam Backup & Replication allows a low-privileged user to connect to remoting services and exploit insecure deserialization by sending a serialized temporary file collection. This exploit allows the attacker to delete any file on the system with service account privileges. The vulnerability is caused by an insufficient blacklist during the deserialization process.
References
Link Resource
https://www.veeam.com/kb4693 Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:veeam:veeam_backup_\&_replication:*:*:*:*:*:*:*:*

History

24 Apr 2025, 17:10

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.1
v2 : unknown
v3 : 8.1
References () https://www.veeam.com/kb4693 - () https://www.veeam.com/kb4693 - Vendor Advisory
CPE cpe:2.3:a:veeam:veeam_backup_\&_replication:*:*:*:*:*:*:*:*
First Time Veeam
Veeam veeam Backup \& Replication

05 Dec 2024, 11:15

Type Values Removed Values Added
CWE CWE-306

Information

Published : 2024-12-04 02:15

Updated : 2025-04-24 17:10


NVD link : CVE-2024-42455

Mitre link : CVE-2024-42455

CVE.ORG link : CVE-2024-42455


JSON object : View

Products Affected

veeam

  • veeam_backup_\&_replication
CWE
CWE-306

Missing Authentication for Critical Function