PT-2024-5903 · Veeam · Veeam Backup & Replication +1

Florian Hauser

·

Published

2024-09-04

·

Updated

2026-02-22

·

CVE-2024-40711

CVSS v3.1
9.8
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Veeam Backup & Replication versions prior to 12.2.0.334
Description Veeam Backup & Replication is affected by a critical deserialization of untrusted data vulnerability that allows for unauthenticated remote code execution (RCE). This flaw, tracked as CVE-2024-40711, has a CVSS score of 9.8 and is actively being exploited by ransomware groups, including Akira and Fog. Attackers are leveraging this vulnerability to gain full control of systems and deploy ransomware. A proof-of-concept exploit is publicly available, increasing the risk of widespread exploitation. The vulnerability is related to .NET Remoting and allows attackers to execute arbitrary code without authentication. The vulnerability has been observed in attacks where attackers establish a local administrator account to deploy ransomware. The vulnerability is actively exploited and has been added to CISA’s Known Exploited Vulnerabilities Catalog.
Recommendations Update Veeam Backup & Replication to version 12.2.0.334 or later.

Exploit

Fix

RCE

Improper Privilege Management

Deserialization of Untrusted Data

Improper Access Control

Weakness Enumeration

Related Identifiers

BDU:2024-06706
CVE-2024-40711
VEEAMBAR_CVE2024_40711

Affected Products

Veeam Backup & Replication
Veeam One