A deserialization of untrusted data vulnerability with a malicious payload can allow an unauthenticated remote code execution (RCE).
https://securityaffairs.com/170717/malware/veeam-backup-replication-flaw-frag-ransomware.html
https://news.sophos.com/en-us/2024/11/08/veeam-exploit-seen-used-again-with-a-new-ransomware-frag/
https://thehackernews.com/2024/10/ransomware-gangs-use-lockbits-fame-to.html
https://blog.talosintelligence.com/akira-ransomware-continues-to-evolve/
https://therecord.media/veam-vulnerability-exploited-ransomware-cisa-kev
https://www.hipaajournal.com/exploitation-fortinet-veeam-backup-replication-vulnerabilities/
https://informationsecuritybuzz.com/veeam-vulnerability-actively-exploited/
https://www.securityweek.com/recent-veeam-vulnerability-exploited-in-ransomware-attacks/
https://www.infosecurity-magazine.com/news/nhs-england-warns-cve-active/
https://thehackernews.com/2024/09/veeam-releases-security-updates-to-fix.html
Published: 2024-09-07
Updated: 2024-10-18
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
Base Score: 9.4
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Severity: Critical