Skip to content

Commit

Permalink
Veeam Releases Critical Updates (#976)
Browse files Browse the repository at this point in the history
* Cisco Affected by OpenSSH Vulnerability

* Format markdown docs

* Update 20240709001-Cisco-Affected-by-OpenSSH-Vulnerability.md

Update with link to previous mentioned CVE advisory

* Oracle Critical Patch Update

* Format markdown docs

* Update 20240719001

* Format markdown docs

* Okta Releases Browser Plugin Advisory

* Format markdown docs

* Update 20240723002

* Advisory_20240801002

* Format markdown docs

* Update 20240801002

Applied "advisory-CISA-ICS-Advisories" template

* Format markdown docs

* Update 20240801002_02

Hyperlink fix

* Format markdown docs

* Advisory-20240823001

* Format markdown docs

* CISA Joint Advisory

* Format markdown docs

* Zabbix Server Advisory

* Format markdown docs

* Veeam Releases Critical Updates

* Format markdown docs

* Veeam Releases Critical Updates 002

* Veeam Releases Critical Updates - 20240909002

* Format markdown docs

* PR provided and changed to read 001

* Deleted

* Deleted

---------

Co-authored-by: CharlesRN <CharlesRN@users.noreply.github.com>
Co-authored-by: Joshua Hitchen (DGov) <86041569+DGovEnterprise@users.noreply.github.com>
Co-authored-by: JadonWill <117053393+JadonWill@users.noreply.github.com>
Co-authored-by: JadonWill <JadonWill@users.noreply.github.com>
  • Loading branch information
5 people authored Sep 9, 2024
1 parent 563aa12 commit 09e3625
Showing 1 changed file with 26 additions and 0 deletions.
26 changes: 26 additions & 0 deletions docs/advisories/20240909001-Veeam-Releases-Critical-Updates.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
# Veeam Releases Critical Updates - 20240909001

## Overview

Veeam has released a security advisory detailing multiple vulnerabilities affecting Veeam ONE, a comprehensive monitoring solution for virtual and data protection environments. These vulnerabilities exposes systems to remote code execution (RCE), credential theft, and configuration tampering.

## What is vulnerable?

| Product(s) Affected | Version(s) | CVE # | CVSS v4/v3 | Severity |
| -------------------------- | -------------- | --------------------------------------------------------------------------------------------------------------------------------------- | ------------- | ---------------------- |
| Veeam Backup & Replication | \< 12.2.0.334 | [CVE-2024-40711](https://nvd.nist.gov/vuln/detail/CVE-2024-40711) | 9.8 | Critical |
| Veeam ONE | \< 12.2.0.4093 | [CVE-2024-42024](https://nvd.nist.gov/vuln/detail/CVE-2024-42024) <br>[CVE-2024-42019](https://nvd.nist.gov/vuln/detail/CVE-2024-42019) | 9.1 <br> 9.0 | Critical <br> Critical |

## What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

## Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 hours...* (refer [Patch Management](../guidelines/patch-management.md)):

- Veeam Security Advisory: <https://www.veeam.com/kb4649>

## Additional References

- SecurtyNewsOnline article: <https://securityonline.info/critical-flaws-in-veeam-one-expose-systems-to-rce-cve-2024-42024-and-credential-theft-cve-2024-42019>

0 comments on commit 09e3625

Please sign in to comment.