Skip to main content

Veeam Service Provider Console Vulnerability ( CVE-2024-29212 )


dips
Forum|alt.badge.img+7
  • Veeam Legend
  • 808 comments

In case you missed it, Veeam has announced a vulnerability affecting the Veeam Service Provider Console Vulnerability 

  • CVE-2024-29212
  • Due to an unsafe deserialization method used by the Veeam Service Provider Console (VSPC) server in communication between the management agent and its components, under certain conditions, it is possible to perform Remote Code Execution (RCE) on the VSPC server machine.

Its rated as Critical and CVSS v3.1 Score: 9.9 so patch as soon as possible

More info: https://www.veeam.com/kb4575

Affected versions: Veeam Service Provider Console | 4.0 | 5.0 | 6.0 | 7.0 | 8.0

2 comments

Chris.Childerhose
Forum|alt.badge.img+21

Was able to catch this Tuesday and patch. No issues. I think this is the third or fourth post here now. 😂


vAdmin
Forum|alt.badge.img+2
  • Influencer
  • 168 comments
  • May 9, 2024

Thank you for sharing the update here, @dips 

The positive aspect is that Veeam internally identified the vulnerability, and there are no reports of active exploitation.

Well done Veeam team for quickly discovering and fixing this vulnerability.


Comment