Veeam’s Vulnerability Volcano: How Four Flaws Forced an IT Giant into Firefighting Mode

Veeam ONE, or should we say Veeam 4-ONE? The platform’s been hit with four vulnerabilities, two of which are as welcome as sharks in your pool. However, Veeam ONE Security Updates are here to save the day, acting as a cybersecurity lifesaver. So, swim towards those updates faster than you’d dodge a piranha in your Jacuzzi.

Hot Take:

Veeam, more like Vee-damn! The IT monitoring and analytics platform has recently been dealt a quadruple whammy, with four vulnerabilities coming to light. Two of these are critically severe – which is kind of like saying you have two sharks in your swimming pool, not just one. The other two are slightly milder, akin to finding piranhas in your Jacuzzi. The company has released fixes, so users should be running for those updates like there’s a fire sale on cybersecurity.

Key Points:

  • Veeam ONE IT monitoring platform was found to have four vulnerabilities, two of which are critically severe.
  • The vulnerabilities range from allowing unauthenticated users to gain information about the SQL server connection to permitting users to obtain the access token of an administrator role.
  • These flaws affect Veeam ONE versions 11, 11a, and 12.
  • Veeam has released fixes for these vulnerabilities in various version updates.
  • In the past, Veeam’s backup software has been exploited by threat actors to distribute malware.

Need to know more?

Four the Hard Way

Veeam ONE, the IT monitoring and analytics platform, has encountered not one, not two, but four vulnerabilities. It's like a cyber-security version of a bad day at the office. Two of these flaws are critically severe and can allow unauthenticated users to gain access to sensitive information and remote code execution on the SQL server.

Minor Threats, Major Problems

The other two vulnerabilities, while less severe, are still cause for concern. One is a cross-site scripting (XSS) vulnerability that allows a user with the Veeam ONE Power User role to obtain the access token of a user with the Administrator role. The other vulnerability lets a user with the Veeam ONE Read-Only User role view the Dashboard Schedule. It's like handing over the keys to your Ferrari to a car thief.

Version Vexations

These vulnerabilities affect Veeam ONE versions 11, 11a, and 12. So if you're using any of these versions, it's time to hit that update button faster than you'd swipe right on a supermodel's Tinder profile.

Update to Evade

Veeam, not wanting to be the cybersecurity equivalent of a sitting duck, has released fixes for these vulnerabilities. The company advises users to stop the Veeam ONE Monitoring and Reporting services, replace the existing files with the ones provided in the hotfix, and restart the two services. It's a little bit like changing the locks on your doors after a break-in.

Deja Vu

In the past, Veeam's backup software has been exploited by threat actors to distribute malware. It's like a recurring nightmare where Freddy Krueger keeps coming back. But this time, Veeam is determined to wake up and put an end to the nightmare.
Tags: critical vulnerabilities, Cross-Site Scripting, NTLM Hash, Security Flaws, security updates, SQL Server, Veeam ONE