Security
Vulnerabilities
Indicated severity values are CVSS 3.1 scores.
Veeam Backup Enterprise Manager (VBEM)
- CVE-2024-29849 | Severity: Critical (9.8)
This vulnerability in VBEM allows an unauthenticated attacker to log in to the VBEM web interface as any user.
- CVE-2024-29850 | Severity: High (8.8)
This Vulnerability in VBEM allows account takeover via NTLM relay.
- CVE-2024-29851 | Severity: High (7.2)
This vulnerability in VBEM allows a high-privileged user to steal the NTLM hash of the VBEM service account if that service account is anything other than the default Local System account.
- CVE-2024-29852 | Severity: Low (2.7)
This vulnerability in VBEM allows high-privileged users to read backup session logs.
Veeam Agent for Windows (VAW)
- CVE-2024-29853 | Severity: High (7.8)
This vulnerability in VAW allows for Local Privilege Escalation.
Third-Party Components
- VMware Virtual Disk Development Kit (VDDK) is no longer directly integrated into the Veeam Transport component and is now only installed for backup infrastructure roles involved in vSphere interaction.
- VMware Virtual Disk Development Kit (VDDK) was updated to 7.0.3.4 to address CVE-2023-38545.
- Microsoft .NET 6.0.25 was updated to 6.0.29.
- Microsoft WebView2 was updated to 123.0.2420.81.
- PostgreSQL installer was updated to 15.6.1.
- PuTTY was updated to 0.81.
- Curl was updated to 8.5.
Hardened Repository
- Hardened repositories installed on RHEL 8/9 and Rocky 8/9 now support applying DISA STIG profiles.
New Features and Enhancements
Platform Support
- AlmaLinux 9.3 and Rocky 9.3 supported for use as Linux-based backup repositories and backup proxies.
- Microsoft Azure Stack HCI 23H2 (March 2024 build) support.
- Microsoft SharePoint Subscription Edition 24 H1 support for application-aware image processing.
General
- Improved VMware NBD (Network Transport Mode) transport mode performance by up to 2x.
- Backup Copy jobs now support using other backup copy jobs as a source for VMware, Cloud Director, and Hyper-V workloads.
- Reduced the performance impact of disk fragmentation on ReFS repositories with Integrity Streams disabled by removing the unneeded low-level file system call.
- Improved Veeam Backup Enterprise Manager data collection performance.
- Veeam AI Assistant window now leverages Markdown markup language for prettier output.
- Windows and Syslog events now contain the backup server’s build number.
- ZFS Block Cloning technology preview. This preview aims to allow Veeam enthusiasts to test the long-term stability and performance of this new ZFS capability. This functionality is currently not supported for production use (not even under Experimental Support terms) and, therefore, should only be used in test labs. For more information, please refer to this Veeam R&D Forum thread.
Malware Detection
- Added the ability to exclude specific file paths from suspicious file system activity analysis.
- Bulk Rename events will now create detailed logs with the list of affected files in the following location: C:\ProgramData\Veeam\Backup\Malware_Detection_Logs\
- Malware detection-related Windows events and Syslog events now provide additional information such as object names, restore point timestamps, and backup server version.
- To reduce the number of false positives from the suspicious file system activity analysis engine, the threshold for the minimum number of modified or deleted files has been increased.
- The sensitivity settings of the proprietary ML malware detection model have been tuned to reduce false positives coming from the inline detection engine.
- To reduce confusion, the “Ransomware Note” malware detection event has been renamed to “Onion Links.”
- Onion links are now detected even in files that are 900 bytes or smaller in size, which NTFS stores directly in the MFT partition.
- Malware detection logs are now archived every week into dedicated zip packages.
Enterprise Applications
- Added support for network traffic encryption (configured in the Global Network Traffic rules dialog) for all application plug-ins.
- Veeam Plug-in for Oracle RMAN: multiple Oracle RAC and Oracle Exadata deployment scenario specific enhancements in response to real-world customer feedback.
- To simplify disaster recovery scenarios, the Db2 plug-in configuration tool now includes a command to get the list of available restore points with timestamps from Veeam Backup & Replication.
- The Microsoft SQL Server plug-in will now intercept errors during backup and recovery command execution and return these error codes to the SQL Server to ensure that the SQL Agent Jobs does not report false-successful results.
- Microsoft SQL Server plug-in will now use the latest version of the ODBC driver present in the system in cases when ODBC driver v17 is not present. You can also force the specific version usage through veeam_config.xml.
- Veeam Plug-in for SAP on Oracle: added support for Oracle Linux 8.
Object Storage
- Veeam Data Cloud Vault, a fully managed secure cloud object storage by Veeam, is now integrated directly into the user interface.
- Scale-out backup repositories now support multiple Performance Tier and Capacity Tier extents backed by Smart Object Storage API (SOSAPI) enabled object storage.
- AWS S3 and IBM Cloud Storage: The default generation period value was increased for AWS S3 and IBM Cloud Storage object storage repositories to minimize the number of API calls and reduce the total storage cost.
- Added support for the new AWS region: Canada West (Calgary).
- Lowered CPU consumption on the backup server during the checkpoint removal process.
Primary Storage
- IBM SVC: Default grainsize and rsize parameter values for creating IBM FlashCopy snapshots were changed to the values recommended by the vendor to improve backup from storage snapshots job performance.
Secondary Storage
- Dell Data Domain: Added support for DDOS 8.0.
- Dell Data Domain: The default DDBoost connection cache value was increased, and the cache itself was optimized to reduce the number of active connections significantly; improved backup performance to Scale-Out Backup Repository with a large number of Data Domain extents.
Security & Compliance Analyzer
- A new backup infrastructure check was added to ensure that the PostgreSQL instance hosting the configuration database has been configured with the recommended settings. These settings can be applied with the Set-VBRPSQLDatabaseServerLimits cmdlet.
- All service status validations now also check whether the checked services are running instead of only verifying their startup type.
- Improved the “Host to Proxy traffic encryption” test to cover additional backup proxy deployment scenarios.
Veeam Agents
- Veeam Agent for Windows 6.1.2.134:
- Support for Metadata Service Version 2 for AWS machines added to Cloud Native protection groups.
- Veeam Agent for Linux 6.1.2.1781:
- AlmaLinux 9.3 & 9.4, RHEL 9.4, Rocky 9.3 & 9.4, and Ubuntu 24.04 Linux distributions support.
- Support for booting Recovery Media in a PXE environment.
- Support for Metadata Service Version 2 for AWS machines added to Cloud Native protection groups.
- Veeam Agent for Mac 2.1.2.464
- Added the ability to exclude folders from backup.
- Objects with the com.apple.metadata:com_apple_backup_excludeItem attribute are now automatically excluded from backup.
- Veeam Agent for Solaris 4.1.1.1423
- Added Bare Metal Recovery support for the latest Solaris updates.
Resolved issues
General
- Processing rate values over 1GB/s are displayed as a whole number only. They will now be rounded to one decimal place.
- High RAM consumption on backup infrastructure components with a large number of CPU cores due to autoscaling the number of buffers according to core count.
- High RAM consumption by Veeam Catalog Service when processing machines containing more than 10 million files.
- High RAM consumption during support log bundle export activity.
- Marking backup as infected was not correctly applied to restore points created by CDP jobs.
- Restore from configuration backup fails when the File to Tape catalog contains over 1 billion records.
- Security & Compliance Analyzer treats Windows Firewall settings applied with a Group Policies Object (GPO) as not implemented best practice.
- Attempting to revoke a capacity-based license fails with the following error:
This type of CollectionView does not support changes to its SourceCollection from a thread different from the Dispatcher thread.
VMware vSphere
- The maximum number of allowed simultaneous NFC connections has been reduced slightly to avoid jobs failing with “VDDK error 16000” in highly loaded vSphere environments.
- High RAM consumption on Linux backup proxies during backup from storage snapshots.
- Instant Recovery to VMware from a Nutanix AHV backup containing Ubuntu VM with LVMs disks fails to start the restored VM.
- The CDP failover wizard does not highlight intervals where malware activity was detected.
Microsoft Hyper-V
- Hyper-V CBT rescan generates unnecessary warnings for standalone SMB3 servers.
- Guest processing via PowerShell Direct fails when PowerShell 2.0 is uninstalled from the Hyper-V host and replaced with a newer version.
Cloud Director
- Self-Service Backup Portal: Job templates do not propagate 8MB block size selection to provisioned backup jobs.
- Veeam Plug-in for VMware Cloud Director: Plugin encounters a failure when interacting with the latest versions of Cloud Director (10.4.1 and higher) when deployed in a multisite environment.
Agent Management
- The managed by backup server jobs report displays incorrect backup size.
- Agent backup jobs to S3-compatible object storage repositories start failing on the configuration import step if the object storage certificate changes.
Unstructured Data Backup
Backup Copy
SureBackup
- Some temporary files may erroneously remain in the virtual lab host’s datastores after SureBackup jobs are completed.
- Adjusted maximum allowed boot time setting in Hyper-V-based Virtual Labs for agent-based backups of Domain Controller.
- Advanced script settings are not applied to agent-based backup.
Tape
Primary storage
- Cisco Hyperflex: Storage rescan task and backup from storage snapshot fails on ESXi versions prior to 7.0.3.
- IBM FlashSystem: an empty volume group is left on the storage if a network problem occurs while a snapshot clone is being deleted.
Object storage
- The health check process erroneously attempts to verify restore points that have been offloaded to the Archive Tier.
- The checkpoint removal process may fail to resume loading Meta/Blocks/Checkpoints/metastore with the following error:
S3 error: The specified version does not exist
- If the S3-compatible object storage fails to delete the temporary backup metadata, the subsequent checkpoint repair processes fail with the error:
Item is locked by a running session
- GFS checkpoint creation failure, followed by an unsuccessful repair attempt, causes backup jobs to fail with an access denied error.
- The Network.RetrieveSSLCertificate command does not timeout during the certificate revocation list check and, as a result, may hang indefinitely.
- Under certain circumstances, agents backing up directly to an object storage repository may hang on executing the Cloud.ReleaseLock command.
- Linux-based gateway servers may hang on the execution of the Cloud.CreateCheckpoint command against long and encrypted backup chains.
- Under rare circumstances, backup jobs pointed to an object storage repository may fail with the error:
add_certificate_authority: cert already in the hash table
- The immutability update process appears to hang with no activity when processing long backup chains.
Scale-out Backup Repository
Veeam Cloud Connect