diff --git a/docs/advisories/20240909001-Veeam-Releases-Critical-Updates.md b/docs/advisories/20240909001-Veeam-Releases-Critical-Updates.md new file mode 100644 index 00000000..2874080b --- /dev/null +++ b/docs/advisories/20240909001-Veeam-Releases-Critical-Updates.md @@ -0,0 +1,26 @@ +# Veeam Releases Critical Updates - 20240909001 + +## Overview + +Veeam has released a security advisory detailing multiple vulnerabilities affecting Veeam ONE, a comprehensive monitoring solution for virtual and data protection environments. These vulnerabilities exposes systems to remote code execution (RCE), credential theft, and configuration tampering. + +## What is vulnerable? + +| Product(s) Affected | Version(s) | CVE # | CVSS v4/v3 | Severity | +| -------------------------- | -------------- | --------------------------------------------------------------------------------------------------------------------------------------- | ------------- | ---------------------- | +| Veeam Backup & Replication | \< 12.2.0.334 | [CVE-2024-40711](https://nvd.nist.gov/vuln/detail/CVE-2024-40711) | 9.8 | Critical | +| Veeam ONE | \< 12.2.0.4093 | [CVE-2024-42024](https://nvd.nist.gov/vuln/detail/CVE-2024-42024)
[CVE-2024-42019](https://nvd.nist.gov/vuln/detail/CVE-2024-42019) | 9.1
9.0 | Critical
Critical | + +## What has been observed? + +There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing. + +## Recommendation + +The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 hours...* (refer [Patch Management](../guidelines/patch-management.md)): + +- Veeam Security Advisory: + +## Additional References + +- SecurtyNewsOnline article: