Skip to main content

CVE-2022-43549 for Veeam Product: for Google Cloud


marcofabbri
Forum|alt.badge.img+13

Good morning everyone!
Today I’m here to share a relatively new CVE, related to Veeam Backup for Google Cloud v1.0 and v3.0, published on 5 December. Maybe someone missed it.

It has 9.8 as CVSS V3 score, so it’s a critical one.

BUT DON’T PANIC.

Continue to read to find the solution.

It’s about an improper authentication in Veeam Backup for Google Cloud v1.0 and v3.0 that allows attackers to bypass authentication mechanisms.

Veeam already published update to solve this CVE, and you just must look at the version of the product. As cited by KB4374:
 

For most users, no actions will be needed, as the Veeam Updater component will have automatically installed this fix during its daily check for updates. After the fix has been installed, the Backup Appliance will be restarted automatically. For environments where the Veeam Backup for Google Cloud backup appliance does not have access to repository.veeam.com, the fix will have to be manually deployed or internet access configured to allow access to the update server.

 

Update server: https://helpcenter.veeam.com/docs/vbgc/guide/ports.html?zoom_highlight=repository.veeam.com&ver=30

CVE link: https://nvd.nist.gov/vuln/detail/CVE-2022-43549

 

To verify version of that component it’s simple: just login in the web console. The fix for the vulnerability documented in this article is being shipped alongside Veeam Updater version 6.0.0.814 and higher.

Screen:

 

9 comments

Chris.Childerhose
Forum|alt.badge.img+21
  • Veeam Legend, Veeam Vanguard
  • 8512 comments
  • December 19, 2022

Amazing how these things pick up near the holidays after being quiet for a bit. Glad to see it patched.


dips
Forum|alt.badge.img+7
  • Veeam Legend
  • 808 comments
  • December 19, 2022

Does Veeam have a dedicated page where they post security related notifications?


Chris.Childerhose
Forum|alt.badge.img+21
  • Veeam Legend, Veeam Vanguard
  • 8512 comments
  • December 19, 2022

dips
Forum|alt.badge.img+7
  • Veeam Legend
  • 808 comments
  • December 19, 2022

Great thank you!


marcofabbri
Forum|alt.badge.img+13
  • Author
  • On the path to Greatness
  • 990 comments
  • December 19, 2022
Chris.Childerhose wrote:

Yup! In addition to this, this is the ultimate CVE archive. Everything that is published, is here - https://www.cvedetails.com/vulnerability-list/vendor_id-15994/Veeam.html


marcofabbri
Forum|alt.badge.img+13
  • Author
  • On the path to Greatness
  • 990 comments
  • December 19, 2022

But for the correct CVE V3 score, I suggest to double-check on https://nvd.nist.gov/ site with a Google search

CVE-ID + nvd.nist.gov.

Like this one, for example: cvedetails has a 0.0, but nist has 9.8. 


Chris.Childerhose
Forum|alt.badge.img+21
  • Veeam Legend, Veeam Vanguard
  • 8512 comments
  • December 19, 2022
marcofabbri wrote:
Chris.Childerhose wrote:

Yup! In addition to this, this is the ultimate CVE archive. Everything that is published, is here - https://www.cvedetails.com/vulnerability-list/vendor_id-15994/Veeam.html

That is a great one too.  Thanks for sharing Marco.


dips
Forum|alt.badge.img+7
  • Veeam Legend
  • 808 comments
  • December 19, 2022

Ah yep, good shout on www.cvedetails.com That is usually my go to place when looking at vulnerabilities. 


Link State
Forum|alt.badge.img+11
  • Veeam Legend
  • 613 comments
  • December 19, 2022
Chris.Childerhose wrote:

i love rss feed😍