diff --git a/docs/advisories/20240909002-Veeam-Releases-Critical-Updates.md b/docs/advisories/20240909002-Veeam-Releases-Critical-Updates.md deleted file mode 100644 index 9d4e8db7..00000000 --- a/docs/advisories/20240909002-Veeam-Releases-Critical-Updates.md +++ /dev/null @@ -1,26 +0,0 @@ -# Veeam Releases Critical Updates - 20240909002 - -## Overview - -Veeam has released a security advisory detailing multiple vulnerabilities affecting Veeam ONE, a comprehensive monitoring solution for virtual and data protection environments. These vulnerabilities exposes systems to remote code execution (RCE), credential theft, and configuration tampering. - -## What is vulnerable? - -| Product(s) Affected | Version(s) | CVE # | CVSS v4/v3 | Severity | -| -------------------------- | -------------- | --------------------------------------------------------------------------------------------------------------------------------------- | ------------- | ---------------------- | -| Veeam Backup & Replication | \< 12.2.0.334 | [CVE-2024-40711](https://nvd.nist.gov/vuln/detail/CVE-2024-40711) | 9.8 | Critical | -| Veeam ONE | \< 12.2.0.4093 | [CVE-2024-42024](https://nvd.nist.gov/vuln/detail/CVE-2024-42024)
[CVE-2024-42019](https://nvd.nist.gov/vuln/detail/CVE-2024-42019) | 9.1
9.0 | Critical
Critical | - -## What has been observed? - -There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing. - -## Recommendation - -The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 hours...* (refer [Patch Management](../guidelines/patch-management.md)): - -- Veeam Security Advisory: - -## Additional References - -- SecurtyNewsOnline article: