Skip to main content

Vulnerability (CVE-2022-26503) in Veeam Agent for Microsoft Windows 


Iams3le
Forum|alt.badge.img+11

Vulnerability (CVE-2022-26503) in Veeam Agent for Microsoft Windows allows local privilege escalation. An attacker who successfully exploited this vulnerability could run arbitrary code with LOCAL SYSTEM privileges.

https://www.veeam.com/kb4289

10 comments

Chris.Childerhose
Forum|alt.badge.img+21
  • Veeam Legend, Veeam Vanguard
  • 8413 comments
  • March 12, 2022

Thanks for sharing


regnor
Forum|alt.badge.img+14
  • Veeam MVP
  • 1346 comments
  • March 13, 2022

There are also some big vulnerabilities in VBR which should be parched immediately (CVSS 9.8): https://www.veeam.com/kb4288


BertrandFR
Forum|alt.badge.img+8
  • Influencer
  • 527 comments
  • March 14, 2022

thx for sharing, for a what a news on monday morning

Severity: Critical
CVSS v3 score: 9.8

:dizzy_face:


Mildur
Forum|alt.badge.img+12
  • Influencer
  • 1035 comments
  • March 14, 2022
BertrandFR wrote:

thx for sharing, for a what a news on monday morning

Severity: Critical
CVSS v3 score: 9.8

:dizzy_face:

@BertrandFR

That was Saturday evening news for me. I have stopped the distribution service on all of our critical environments immediately :)


BertrandFR
Forum|alt.badge.img+8
  • Influencer
  • 527 comments
  • March 14, 2022
Mildur wrote:
BertrandFR wrote:

thx for sharing, for a what a news on monday morning

Severity: Critical
CVSS v3 score: 9.8

:dizzy_face:

@BertrandFR

That was Saturday evening news for me. I have stopped the distribution service on all of our critical environments immediately :)

What a nice saturday night for you! I think the emergency will depend if your infra is exposed :sweat_smile: but patch quickly anyway


Mildur
Forum|alt.badge.img+12
  • Influencer
  • 1035 comments
  • March 14, 2022
BertrandFR wrote:
Mildur wrote:
BertrandFR wrote:

thx for sharing, for a what a news on monday morning

Severity: Critical
CVSS v3 score: 9.8

:dizzy_face:

@BertrandFR

That was Saturday evening news for me. I have stopped the distribution service on all of our critical environments immediately :)

What a nice saturday night for you! I think the emergency will depend if your infra is exposed :sweat_smile: but patch quickly anyway

Patching will be planned for this week.

The Distribution Service on Port 9380 is listening on each VBR server by default. Not all environments have closed this port on their firewall or have a dedicated subnet where the vbr server is installed. I thinking of small customers with only a few machines to backup. So better disable the service until there is a maintenance window to patch the product. :)

If this vulnerability is somehow used to gain access to the vbr server, the entire credential database can be exported. All domain and hypervisor Accounts would be available to the hacker.

 


BertrandFR
Forum|alt.badge.img+8
  • Influencer
  • 527 comments
  • March 14, 2022

Good suggestions @Mildur 


Link State
Forum|alt.badge.img+11
  • Veeam Legend
  • 602 comments
  • March 14, 2022
  • Temporary mitigation of the vulnerabilities: Stop and disable the Veeam Distribution Service. The Veeam Distribution Service is installed on the Veeam Backup & Replication server and servers specified as distribution servers in Protection Groups.

confirm this fix temp the vul?


Mildur
Forum|alt.badge.img+12
  • Influencer
  • 1035 comments
  • March 14, 2022
Link State wrote:
  • Temporary mitigation of the vulnerabilities: Stop and disable the Veeam Distribution Service. The Veeam Distribution Service is installed on the Veeam Backup & Replication server and servers specified as distribution servers in Protection Groups.

confirm this fix temp the vul?

Yes, the issue lies in the Distribution Service.

If you disable the Service, the Port 9380 is shutdown and cannot be used from the network to overtake the vbr or distribution server.

 


Link State
Forum|alt.badge.img+11
  • Veeam Legend
  • 602 comments
  • March 14, 2022

Thx @Mildur  & all.

Send magic powershell command for stop & disable bugged service :D


Comment