Skip to main content

vScan Vulnerability Scanner - Vulnerability Assessment in your Veeam Backups.


Forum|alt.badge.img+3

I’m really happy to share with the Veeam Community another Open Source Project “vScan Vulnerability Scanner”

 

vScan Dashboard

This is an Open-Source project created as a Security scanning tool that integrates with Veeam Backup & Replication to perform vulnerability assessments on backup data without needing a full restore. It leverages Veeam Data Integration API to mount backup content directly to Linux servers and scan them using open-source security tools Trivy and Grype.

Why is this solution created? In the event of a disaster or security incident, when the Veeam Admin or the Security Team needs to recover a server (whether it's the latest or a previous copy), they need to know what vulnerabilities exist in that Veeam Backup.

While Veeam can detect malware, ransomware, IoC, etc, it doesn't detect vulnerabilities. For example, Consider these scenarios: What if a Veeam Admin restores a backup that contains a vulnerable version of OpenSSL? What if they restore an image with vulnerabilities in the CISA KEV catalog?

If the attacker is in the network or from internet, they can exploit these vulnerabilities and execute any persistence tool.

With this solution, Veeam Admins (or Security Admins ;) ) can identify vulnerabilities in their Veeam Backups and implement necessary mitigation measures before restore the server to production or exposing it to the internet.

 

This is a Desktop Application to be used in the workstation of Veeam Admins or Security Admins.
 

Features

  • Integration with Veeam Data Integration API
  • Integration with Security Scanners Trivy / Grype
  • Automatic Installation and update of Scanners
  • Granular Selection of Backups and Disks to be Analyzed from Veeam Repositories
  • Use Linux Server for Scan from VBR Server or use a external Linux Server.
  • Dashboard with Vulnerability Trends and Severity Distribution
  • Vulnerability list integrated with Nist National Vulnerabilty Database (NVD) and GitHub Advisory Database
  • Verification of CVE's with CISA Known Exploited Vulnerabilities Catalog
  • Vulnerabilities Status Tracking
  • Vulnerabilities Filter By Severity, Status, Package, Server Name, etc.
  • Export Vulnerabilities Details in CSV / HTML
  • Email Notifications
  • Connection Status

How To Use

  • Open the Application wit Administrator Rights
  • Go to Settings and validate if VBR Console and Powershell Module are installed
  • If VBR Console and Powershell mOdule are installed, Enter the VBR Credentials.
  • After a successful connection, go to Linux Scanner.
  • In Linux Scanners, Select a Linux Scanner (Preferred Proxy) from VBR ane enter the credentials. If you dont want use a Linux from VBR you can enter manually a Linux server to connect.
  • Then click in "Test Connection" after a successful test, click in "Save Configuration" and the Connection manager will update the status to Connected.
  • If you want configure Email Notification, go to "Notifications" and enter the data, First Test Email, then Save the Config.
  • Go to "Scans" Select VBR, in "SEARCH / SELECT Server" select the server to Scan, then Select Restore point, Disck and "Add to Queue" if you want add multiples servers always add to Queue and then clic in "Mount".
  • After the mount Operation, you can select the Scanner, Trivy or Grype, then click "START SCAN".
  • When the Scan Finalize, the application will show a Summary, you will se 3 options:
    • Continue Scanning: This option allows to Scan the machines with the other Scanner, if was selected Trivy, you can rescan with Grype.
    • Keep Mounted & View: This option will keep mount the Servers in VBR, then you need manually dismount the servers.
    • Unmount & View Results: This option will unmount all the servers from the Linux Scanner and will show the vulnerabilities found.
  • In Vulnerabilities you can Filter by multiple options to analyze the vulnerabilities found or export all Vulnerabilities or Grouped.

Download and more information: https://github.com/VeeamHub/veeam-vscan-security

 

 

17 comments

marco_s
Forum|alt.badge.img+8
  • Influencer
  • 368 comments
  • January 29, 2025

Another fantastic project!! Can’t wait to test it!! 


Dynamic
Forum|alt.badge.img+8
  • Influencer
  • 361 comments
  • January 29, 2025

Wow! After implementing Decoys two weeks ago, I’m ready for some new fancy stuff 😉

Looks awesome, will be testing asap! Thanks 💚


Chris.Childerhose
Forum|alt.badge.img+21
  • Veeam Legend, Veeam Vanguard
  • 8402 comments
  • January 29, 2025

This looks amazing. Time to test in my lab. Great project and contribution to the community.


coolsport00
Forum|alt.badge.img+20
  • Veeam Legend
  • 4109 comments
  • January 29, 2025

This is great ​@Marco.Escobar ! So, this tool doesn’t detect malware, just application and/or tool vulnerabilities installed within a given VM? (i.e. within a particular VM or VMs backups)

Regardless, great project and tool! Thanks for sharing. Bookmarked!


AndrePulia
Forum|alt.badge.img+5
  • Veeam Legend
  • 318 comments
  • January 29, 2025

@Marco.Escobar It works only for linux OSes?


Forum|alt.badge.img+3
  • Author
  • Comes here often
  • 8 comments
  • January 29, 2025
AndrePulia wrote:

@Marco.Escobar It works only for linux OSes?

Hi Andre

this first version, yes, only for Linux OS, I will add Windows Support and other OS in the future


Forum|alt.badge.img+3
  • Author
  • Comes here often
  • 8 comments
  • January 29, 2025
coolsport00 wrote:

This is great ​@Marco.Escobar ! So, this tool doesn’t detect malware, just application and/or tool vulnerabilities installed within a given VM? (i.e. within a particular VM or VMs backups)

Regardless, great project and tool! Thanks for sharing. Bookmarked!

Hi Shane, correct only for vulnerabilities in backed up servers, remember, today Veeam detects malware, ioc, ransomware etc, and if you add Recon you will have more detections. And always we can integrate other solutions :)


coolsport00
Forum|alt.badge.img+20
  • Veeam Legend
  • 4109 comments
  • January 29, 2025

Understood Marco...thank you!


AndrePulia
Forum|alt.badge.img+5
  • Veeam Legend
  • 318 comments
  • January 29, 2025
Marco.Escobar wrote:
AndrePulia wrote:

@Marco.Escobar It works only for linux OSes?

Hi Andre

this first version, yes, only for Linux OS, I will add Windows Support and other OS in the future

Thank yo Marco!!! well done!


Jean.peres.bkp
Forum|alt.badge.img+8

Thanks for shared!


Iams3le
Forum|alt.badge.img+11
  • Veeam Legend
  • 1374 comments
  • February 6, 2025

Had the time to digest this correctly! Thank you very much for sharing ​@Marco.Escobar


  • New Here
  • 1 comment
  • February 7, 2025

Excellent tool.
I look forward to support for other operating systems.

I congratulate you for the work you did.


  • New Here
  • 2 comments
  • February 28, 2025

Hello,
The application is exciting, but we encountered an error connecting to a Linux VM.
We reinstalled the system several times, installed scanners manually, and tried to do it through the scanner, but the result was the same - Command failed with code 1
Have you encountered such an error before?

 


Forum|alt.badge.img+3
  • Author
  • Comes here often
  • 8 comments
  • February 28, 2025
DBV wrote:

Hello,
The application is exciting, but we encountered an error connecting to a Linux VM.
We reinstalled the system several times, installed scanners manually, and tried to do it through the scanner, but the result was the same - Command failed with code 1
Have you encountered such an error before?

 

Hi DBV, I need more info, that ubuntu have internet access? Firewall allowing connections or disabled? The user have sudo privileges? Can you send the complete log in github please. In parallel, can you test with rocky linux?

Thanks! 


  • New Here
  • 2 comments
  • February 28, 2025
Marco.Escobar wrote:
DBV wrote:

Hello,
The application is exciting, but we encountered an error connecting to a Linux VM.
We reinstalled the system several times, installed scanners manually, and tried to do it through the scanner, but the result was the same - Command failed with code 1
Have you encountered such an error before?

 

Hi DBV, I need more info, that ubuntu have internet access? Firewall allowing connections or disabled? The user have sudo privileges? Can you send the complete log in github please. In parallel, can you test with rocky linux?

Thanks! 

There is access to the Internet without any restrictions. The user has sudo access. There are no firewall blocks. There is no firewall as such.
Yes, of course, I will send the log.
Thank you


Scott
Forum|alt.badge.img+8
  • Veeam Legend
  • 993 comments
  • March 4, 2025

Amazing tool, can’t wait to see it as it continues. Looks like it would integrate with the  v13 demo quite well. 


matheusgiovanini
Forum|alt.badge.img+5

Great article! VSCAN looks like a powerful tool to enhance security within Veeam environments. Integrating vulnerability assessment directly into backups is a smart approach to detecting threats before they become a bigger issue. 


Comment