This article documents a vulnerability discovered in Veeam Backup Enterprise Manager (VBEM), a supplementary application customers may deploy to manage Veeam Backup & Replication (VBR) using a web console.
Deploying VBEM is optional; not all environments will have it installed. As such, if VBEM was not deployed in your environment, that environment would not be impacted by this vulnerability.
Tip: You can identify if VBEM is installed by checking for the Veeam Backup Enterprise Manager service or by running the following PowerShell command on the Veeam Backup Server to see if VBR reports that it is managed by a VBEM deployment.
Get-VBRServer | Out-Null [Veeam.Backup.Core.SBackupOptions]::GetEnterpriseServerInfo() | Format-List
This vulnerability in Veeam Backup Enterprise Manager allows attackers to bypass the authentication while performing a Man-in-the-Middle (MITM) attack.
Severity: High
CVSS v3.1 Score: 7.7AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
This vulnerability was reported by ZDI through Hacker One.
The vulnerability documented in this article was resolved with a hotfix for Veeam Backup Enterprise Manager 12.2.0.334. This hotfix is available directly via this article and was integrated into repackaged ISOs for Veeam Backup & Replication and Veeam Data Platform released on 2024-11-06.
The hotfix requires the existing Veeam Backup Enterprise Manager deployment to be running 12.2.0.334. You can check which version of Veeam Backup Enterprise Manager is installed by viewing the About section of the Configuration view.
If an earlier version of Veeam Backup Enterprise Manager (12.1.2.172 or older) is deployed, upgrade to 12.2.0.334 using the latest Veeam Backup & Replication ISO, which contains the hotfix and will automatically deploy it.
Note: If running the hotfix results in the error "This update is not compatible with installed software version." it means that either:
Please note that a reboot may be required after installing the hotfix.
Please plan accordingly.
Hotfix Filename | SHA1 Hash |
Veeam.Backup.Enterprise.Core.dll | FDC176FCE4825023F14462A51541C1DF591B28AC |
Use the following PowerShell command to check the SHA1 hash value of the DLL.
This form is only for KB Feedback/Suggestions, if you need help with the software open a support case