Veeam’s Vulnerability Comedy of Errors: Patch Now or Prepare for Chaos!
A critical flaw in Veeam VSPC could let hackers play ‘remote control’ with your system, thanks to a vulnerability rated 9.9 on the CVSS scale. Veeam urges immediate updates to dodge potential chaos.

Hot Take:
Veeam’s Service Provider Console has discovered that when it rains, it pours… vulnerabilities! A critical flaw rated 9.9 on the “Oops, We Did It Again!” scale and another bug giving a peek into NTLM hashes have forced Veeam to release a patch in double-time. Who knew securing your system could be so patchy?
Key Points:
- The critical flaw, CVE-2024-42448, allows remote code execution and is rated 9.9 CVSS, which is about as serious as a vulnerability gets without buying you dinner first.
- The second flaw, CVE-2024-42449, is no slouch either, enabling NTLM hash leaks and file deletions with a 7.1 CVSS rating.
- Vulnerable versions include Veeam Service Provider Console 8.1.0.21377 and earlier in the 7 and 8 builds.
- A patched version, 8.1.0.21999, has been released to address these vulnerabilities.
- Experts stress the urgency of updating systems to avoid potential data heists and digital chaos.
Already a member? Log in here