Veeam Urges Critical Update: Security Flaws Put Your Backup at Risk!
Veeam Backup Enterprise Manager users must update to the latest version due to a critical security flaw (CVE-2024-29849) that allows attackers to bypass authentication. Three other vulnerabilities have been identified, but all have been addressed in version 12.1.2.172. Update now to secure your system!

Hot Take:
Veeam just handed out vulnerability CVEs like candy on Halloween. Time to patch up those security gaps, folks, before the hackers treat themselves to your data!
Key Points:
- Critical flaw CVE-2024-29849 allows attackers to bypass authentication in Veeam Backup Enterprise Manager.
- Other notable flaws include CVE-2024-29850 (account takeover via NTLM relay), CVE-2024-29851 (NTLM hash theft), and CVE-2024-29852 (log reading).
- All vulnerabilities are patched in version 12.1.2.172.
- Veeam has also fixed CVE-2024-29853 (local privilege escalation) and CVE-2024-29212 (remote code execution) in other products.
- Previous vulnerabilities in Veeam Backup & Replication were exploited by threat groups like FIN7 and Cuba.
Already a member? Log in here