To kick off the group here is the first post that VCSPs should know about as it relates to VSPC and a CVE. You can find details here -
Veeam has announced a vulnerability affecting the Veeam Service Provider Console Vulnerability
- CVE-2024-29212
- Due to an unsafe deserialization method used by the Veeam Service Provider Console (VSPC) server in communication between the management agent and its components, under certain conditions, it is possible to perform Remote Code Execution (RCE) on the VSPC server machine.
Its rated as Critical and CVSS v3.1 Score: 9.9 so patch as soon as possible
More info: https://www.veeam.com/kb4575
Affected versions: Veeam Service Provider Console | 4.0 | 5.0 | 6.0 | 7.0 | 8.0
The patch and release notes can be found here - KB4509: Release History for Veeam Service Provider Console 8