Post by account_disabled on Feb 24, 2024 5:29:27 GMT
Veeam has reported a vulnerability affecting all out-of-date Veeam Backup & Replication (VBR) solutions . What to do if your VBR service is at risk of vulnerability? Updating to a supported version and applying the security patch are the most effective solutions to fix the bug which, as we will observe below, could facilitate the entry of unauthorized guests into the backup server. Content index: Vulnerability Solutions to vulnerability This is how Shellrent is doing it Vulnerability The CVE-2023-27532 vulnerability, which affects all out-of-date versions of Veeam Backup & Replication, has been assessed by the high-level Common Vulnerability Scoring System ( CVSS ) as a bug that attackers could exploit to gain access to backup infrastructure host.
Essentially, unauthorized users could request and obtain encrypted Qatar Mobile Number List credentials stored in the configuration database, thus gaining access to Veeam. The starting point of the vulnerability is Veeam.Backup.Service.exe , which by default is on TCP port 9401. Solutions to vulnerability The vulnerability has been resolved in versions 11a and 12 of Veeam Backup & Replication for which a patch has been developed in order to mitigate the bug. If a previous version is in use, the supplier requests an immediate upgrade to a supported version in order to correctly use the patch . As a temporary solution while waiting for the patch to be applied, you can block access to TCP port 9401 on your Veeam Backup & Replication server.
This will affect the connection of your servers to the VBR server, so this mode is only suitable if you do not have a deployed Veeam environment. Have you recently upgraded to V11 or V12? Check the ISO image you used for the update. 20230227 (V11) and 20230223 (V12) already include patches and are therefore no longer vulnerable. This is how Shellrent is doing it Following the report from the supplier, our technical department immediately took action to identify the services potentially at risk of vulnerability and worked to promptly resolve the problem. If you are not one of our customers but would like to rely on a team of experts who constantly support your backup strategy with Veeam, contact our technicians.
Essentially, unauthorized users could request and obtain encrypted Qatar Mobile Number List credentials stored in the configuration database, thus gaining access to Veeam. The starting point of the vulnerability is Veeam.Backup.Service.exe , which by default is on TCP port 9401. Solutions to vulnerability The vulnerability has been resolved in versions 11a and 12 of Veeam Backup & Replication for which a patch has been developed in order to mitigate the bug. If a previous version is in use, the supplier requests an immediate upgrade to a supported version in order to correctly use the patch . As a temporary solution while waiting for the patch to be applied, you can block access to TCP port 9401 on your Veeam Backup & Replication server.
This will affect the connection of your servers to the VBR server, so this mode is only suitable if you do not have a deployed Veeam environment. Have you recently upgraded to V11 or V12? Check the ISO image you used for the update. 20230227 (V11) and 20230223 (V12) already include patches and are therefore no longer vulnerable. This is how Shellrent is doing it Following the report from the supplier, our technical department immediately took action to identify the services potentially at risk of vulnerability and worked to promptly resolve the problem. If you are not one of our customers but would like to rely on a team of experts who constantly support your backup strategy with Veeam, contact our technicians.