$4.99/mo - Save 61% With Exclusive 2-Year Plan + 4 Months Free!Claim Now

Veeam RCE Flaw: Update Now to Avoid Critical Exploits

  • Last updated December 4, 2024
  • written by
    Writer

San Francisco, December 4, 2024Veeam patches critical RCE flaw (CVE-2024-42448). Update immediately to avoid exploits and potential ransomware attacks targeting vulnerable systems.

A critical Remote Code Execution (RCE) vulnerability has been discovered in the Veeam Service Provider Console (VSPC), posing a major threat to businesses worldwide.

The flaw, tracked as CVE-2024-42448, carries a staggering CVSS severity score of 9.9 out of 10. Veeam has issued a patch and urges immediate updates to safeguard against potential exploits.

The vulnerability, identified during internal testing, allows attackers to execute arbitrary code on vulnerable systems if the management agent is authorized on the VSPC server.

Compounding the risk, a second flaw (CVE-2024-42449) can leak sensitive NTLM hash information and delete files, exposing systems to further exploitation.

Vulnerable versions include Veeam Service Provider Console 8.1.0.21377 and earlier versions of builds 7 and 8. The issues have been resolved in version 8.1.0.21999, but no temporary mitigations are available—upgrading is the only fix. Cybersecurity expert Liam Grant added:

States like California, Texas, and New York, where Veeam is widely deployed, are particularly at risk of targeted cyberattacks. Businesses are advised to prioritize patching to prevent devastating consequences.


Other News At VPNRanks


Hey, wait!

Stay informed on the latest privacy updates, cybersecurity insights, and internet freedom news by following VPNRanks news daily! As your primary resource for critical updates in online security, we ensure you’re always in the know. Make VPNRanks your go-to guide for safeguarding your digital life!