Veeam Service Provider Console < 8.1.0.21999 Multiple Vulnerabilities (kb4679)

high Nessus Plugin ID 212091

Synopsis

The remote host is missing one or more security updates.

Description

The version of Veeam Service Provider Console installed on the remote host is prior to 8.1.0.21999. It is, therefore, affected by multiple vulnerabilities as referenced in the kb4679 advisory.

- From the VSPC management agent machine, under the condition that the management agent is authorized on the server, it is possible to perform Remote Code Execution (RCE) on the VSPC server machine. (CVE-2024-42448)

- From the VSPC management agent machine, under condition that the management agent is authorized on the server, it is possible to remove arbitrary files on the VSPC server machine. (CVE-2024-42449)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Veeam Service Provider Console version 8.1.0.21999 or later.

See Also

https://www.veeam.com/kb4679

Plugin Details

Severity: High

ID: 212091

File Name: veeam_service_provider_console_kb4679.nasl

Version: 1.1

Type: local

Agent: windows

Family: Windows

Published: 12/5/2024

Updated: 12/5/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.0

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:C

CVSS Score Source: CVE-2024-42449

CVSS v3

Risk Factor: High

Base Score: 7.1

Temporal Score: 6.2

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: x-cpe:/a:veeam:veeam_service_provider_console

Required KB Items: installed_sw/Veeam Service Provider Console

Exploit Ease: No known exploits are available

Patch Publication Date: 12/3/2024

Vulnerability Publication Date: 12/4/2024

Reference Information

CVE: CVE-2024-42448, CVE-2024-42449

IAVA: 2024-A-0774