Логотип exploitDog
bind:CVE-2024-42457
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-42457

Количество 3

Количество 3

nvd логотип

CVE-2024-42457

около 1 года назад

A vulnerability in Veeam Backup & Replication allows users with certain operator roles to expose saved credentials by leveraging a combination of methods in a remote management interface. This can be achieved using a session object that allows for credential enumeration and exploitation, leading to the leak of plaintext credentials to a malicious host. The attack is facilitated by improper usage of a method that allows operators to add a new host with an attacker-controlled IP, enabling them to retrieve sensitive credentials in plaintext.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-pwc4-hfx3-7qw8

около 1 года назад

A vulnerability in Veeam Backup & Replication allows users with certain operator roles to expose saved credentials by leveraging a combination of methods in a remote management interface. This can be achieved using a session object that allows for credential enumeration and exploitation, leading to the leak of plaintext credentials to a malicious host. The attack is facilitated by improper usage of a method that allows operators to add a new host with an attacker-controlled IP, enabling them to retrieve sensitive credentials in plaintext.

CVSS3: 7.7
EPSS: Низкий
fstec логотип

BDU:2024-11225

больше 1 года назад

Уязвимость интерфейса удаленного управления средства защиты облачных, виртуальных и физических систем Veeam Backup & Replication, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-42457

A vulnerability in Veeam Backup & Replication allows users with certain operator roles to expose saved credentials by leveraging a combination of methods in a remote management interface. This can be achieved using a session object that allows for credential enumeration and exploitation, leading to the leak of plaintext credentials to a malicious host. The attack is facilitated by improper usage of a method that allows operators to add a new host with an attacker-controlled IP, enabling them to retrieve sensitive credentials in plaintext.

CVSS3: 6.5
0%
Низкий
около 1 года назад
github логотип
GHSA-pwc4-hfx3-7qw8

A vulnerability in Veeam Backup & Replication allows users with certain operator roles to expose saved credentials by leveraging a combination of methods in a remote management interface. This can be achieved using a session object that allows for credential enumeration and exploitation, leading to the leak of plaintext credentials to a malicious host. The attack is facilitated by improper usage of a method that allows operators to add a new host with an attacker-controlled IP, enabling them to retrieve sensitive credentials in plaintext.

CVSS3: 7.7
0%
Низкий
около 1 года назад
fstec логотип
BDU:2024-11225

Уязвимость интерфейса удаленного управления средства защиты облачных, виртуальных и физических систем Veeam Backup & Replication, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.7
0%
Низкий
больше 1 года назад

Уязвимостей на страницу