Cythera Cyber Security

Veeam Backup and Replication Vulnerability - CVE-2024-40711

Veeam has announced a critical vulnerability whereby an attacker can execute arbitrary code on any system running Veaam Backup and Replication 12.1.2.172 or earlier.
Talk to an expert

Veeam Backup and Replication Vulnerability

  • CVE ID - CVE-2024-40711
  • CVSS - 9.8/10

What Is Vulnerable

What is Happening

Veeam has announced a critical vulnerability whereby an attacker can execute arbitrary code on any system running Veaam Backup and Replication 12.1.2.172 or earlier.
Successful exploitation of CVE-2024-40711 can allow an attacker to gain full control of a system, manipulate data, and potentially move laterally within a network, making it a relatively high-value target for threat actors.


Key Facts

  • The only affected product by this vulnerability within the Veeam product suite is Veeam Backup & Replication.
  • Adversaries can only exploit this vulnerability if they already have a foothold in your private environment, unless the Veeam solution is internet facing.
  • Updates to remediate this vulnerability have been issued

What you can do

  • Veeam Backup & Replication should immediately be upgraded to version 12.2 build 12.2.0.334. It is recommended to prioritise this patch as soon as possible, and to not wait for a regular patch cycle.
  • Instructions on how to install this patch can be found here

Assessing for possible impact

Cythera is actively monitoring for exploitation and post-exploitation activity associated with CVE-2024-40711 for managed detection and response clients 

Cythera is committed to protecting our customers from cyber threats and ensuring their business continuity.
If you have any questions or concerns about this or any other cybersecurity issue, please contact us


Events

Latest events

Join Cythera experts for networking events, technical briefings, and hands-on workshops hosted throughout the year.
View all events
No items found.
Cyber security news

Latest advisories

Stay ahead of emerging threats with our expert blog posts, research, and industry updates.
Silverstripe - Host Header Injection
Silverstripe CMS is affected by a Host Header Injection flaw, which can be exploited to manipulate password reset workflows, potentially redirecting or compromising user data.
FarCry Core Framework - Multiple Issues
FarCry Core contains multiple vulnerabilities that could let unauthenticated users upload arbitrary files and execute remote code on the hosting server.
Silverstripe – Cross-Site Scripting (XSS) Vulnerability
With local organisation admin credentials, an attacker can exploit the API to create, delete, or revert virtual machine snapshots in other organisations’ Virtual Data Centres (VDCs), breaching isolation boundaries.