A total of five of the vulnerabilities were rated as critical.
Updates have been released by Veeam to remediate 18 significant flaws impacting several products, five of which are critical in severity.
The most serious of the patched vulnerabilities are a pair of issues affecting the Veeam Service Provider Console, tracked as CVE-2024-38650 and CVE-2024-39714, which could be exploited to facilitate VSPC server account's NTLM hash and allow arbitrary file uploads, respectively.
Veeam also fixed a critical unauthenticated remote code execution bug in Veeam Backup & Replication, tracked as
CVE-2024-40711, which could be leveraged to facilitate total system hijacking. However Veeam refused to provide technical details due to its potential exploitation in ransomware attacks.
Written by
Dan Raywood
Senior Editor
SC Media UK
Dan Raywood is a B2B journalist with more than 20 years of experience, including covering cybersecurity for the past 16 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.
He has spoken at events including 44CON, Infosecurity Europe, RANT Conference, BSides Scotland, Steelcon and ESET Security Days.
Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.