From 1a0088b9165ffda2736ed23f26b632127148c14d Mon Sep 17 00:00:00 2001 From: CharlesRN <125233614+CharlesRN@users.noreply.github.com> Date: Mon, 9 Sep 2024 11:59:44 +0800 Subject: [PATCH] Veeam Releases Critical Updates 002 --- ...0909002-Veeam-Releases-Critical-Updates.md | 25 +++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 docs/advisories/20240909002-Veeam-Releases-Critical-Updates.md diff --git a/docs/advisories/20240909002-Veeam-Releases-Critical-Updates.md b/docs/advisories/20240909002-Veeam-Releases-Critical-Updates.md new file mode 100644 index 00000000..381ca5dd --- /dev/null +++ b/docs/advisories/20240909002-Veeam-Releases-Critical-Updates.md @@ -0,0 +1,25 @@ +# Veeam Releases Critical Updates - 20240909002 + +## Overview + +Veeam has released a security advisory detailing multiple vulnerabilities affecting Veeam ONE, a comprehensive monitoring solution for virtual and data protection environments. These vulnerabilities exposes systems to remote code execution (RCE), credential theft, and configuration tampering. + +## What is vulnerable? + +| Product(s) Affected | Version(s) | CVE # | CVSS v4/v3 | Severity | +| ------------------------------ | ------------------------------------------------------------------------------------------------------------------------- | --------------------------------------------------------------- | ---------- | -------- | +| Veeam Backup & Replication | < 12.2.0.334 | [CVE-2024-40711](https://nvd.nist.gov/vuln/detail/CVE-2024-40711) | 9.8 | Critical | +| Veeam ONE | < 12.2.0.4093 | [CVE-2024-42024](https://nvd.nist.gov/vuln/detail/CVE-2024-42024)
[CVE-2024-42019](https://nvd.nist.gov/vuln/detail/CVE-2024-42019)| 9.1
9.0 | Critical
Critical | + +## What has been observed? + +There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing. + +## Recommendation + +The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 hours...* (refer [Patch Management](../guidelines/patch-management.md)): +- Veeam Security Advisory: + +## Additional References + +- SecurtyNewsOnline article: