This article documents a vulnerability discovered in the Web Console component of Veeam Recovery Orchestrator.
This vulnerability does not affect other Veeam products (e.g., Veeam Backup & Replication, Veeam Agent for Microsoft Windows, Veeam ONE, Veeam Service Provider Console, etc.).
A vulnerability (CVE-2024-29855) in Veeam Recovery Orchestrator (VRO) version 7.0.0.337 allows an attacker to access the VRO web UI with administrative privileges.
Note: The attacker must know the exact username and role of an account that has an active VRO UI access token to accomplish the hijack.
Severity: Critical
CVSS 3.1 Score: 9.0CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
The vulnerability discussed in this article was resolved starting in:
The updated build number will only be displayed within the Programs & Features (appwiz.cpl) entry for Veeam Recovery Orchestrator. The build number shown within the UI and logs will still be listed as the previous version.
The build number displayed in the UI and logs will be updated in the next Veeam Recovery Orchestrator release.
For environments operating VRO 7.0.0.337, either upgrade to 7.1.0.230 or install the following patch to update to build 7.0.0.379.
To update: download the patch (.msp) file and execute it on the VRO server using an Administrative Command Prompt or Administrative PowerShell console.
For environments operating VRO 7.1.0.205, install the following patch to update to build 7.1.0.230.
To update: download the patch (.msp) file and execute it on the VRO server using an Administrative Command Prompt or Administrative PowerShell console.
This form is only for KB Feedback/Suggestions, if you need help with the software open a support case