The issues documented in this article affect the following versions:
Veeam Recovery Orchestrator 7 is not impacted by these issues.
Vulnerability CVE-2024-22021 allows a Veeam Recovery Orchestrator user with a low privileged role (Plan Author) to retrieve plans from a Scope other than the one they are assigned to.
Affected Version(s)*:
Severity: Medium
CVSS v3.1 Score: 4.5
Vulnerability CVE-2024-22022 allows a Veeam Recovery Orchestrator user that has been assigned a low-privileged role to access the NTLM hash of the service account used by the Veeam Orchestrator Server Service.
Affected Version(s)*:
Severity: High
CVSS v3.1 Score: 8.8
*Vulnerability testing was only performed using actively supported versions of Veeam Recovery Orchestrator.
The vulnerabilities documented in this article are already fixed in Veeam Recovery Orchestrator version 7.
Customers are advised to upgrade to the latest Veeam Recovery Orchestrator version.
Veeam strongly recommends that customers use the most recent version of the software. However, we understand some environments may require additional planning and time to deploy an upgrade. In recognition of this, a patch has been developed for Veeam Recovery Orchestrator 6 that resolves the vulnerabilities discussed in this article. We encourage affected users who are unable to upgrade to Veeam Recovery Orchestrator 7 to apply this patch as soon as possible to maintain system security.
Requirements
This patch requires Veeam Recovery Orchestrator 6 P20230419 (6.0.0.3516).
To check which version is installed, switch to Administration view, then select the About section.
Preparation
Update Procedure
Please note that a reboot may be required after installing the patch.
Please plan accordingly.
This form is only for KB Feedback/Suggestions, if you need help with the software open a support case