7th November 2023
Yesterday Veeam announced 4 vulnerabilities in its Veeam ONE IT monitoring and reporting solution. Two of the vulnerabilities are of Critical severity. Hotfixes (patches) have been released to remedy the situation. The breakdown of the vulnerabilities is as follows:
CVE-2023-38547 (CVSS 3.1: 9.9) allows an unauthenticated user to gain information about the SQL server connection Veeam ONE uses to access its configuration database. This may lead to remote code execution on the SQL server hosting the Veeam ONE configuration database.
CVE-2023-38548 (CVSS 3.1: 9.8) allows an unprivileged user who has access to the Veeam ONE Web Client the ability to acquire the NTLM hash of the account used by the Veeam ONE Reporting Service.
CVE-2023-38549 (CVSS 3.1: 4.5) allows a user with the Veeam ONE Power User role to obtain the access token of a user with the Veeam ONE Administrator role through the use of XSS. Note: The criticality of this vulnerability is reduced as it requires interaction by a user with the Veeam ONE Administrator role.
CVE-2023-41723 (CVSS 3.1: 4.3) allows a user with the Veeam ONE Read-Only User role to view the Dashboard Schedule. Note: The criticality of this vulnerability is reduced because the user with the Read-Only role is only able to view the schedule and cannot make changes.
Each of the following product versions are affected by at least one of these vulnerabilities:
Veeam ONE 11, 11a, 12
Veeam has released Hotfixes for the following versions:
- Veeam ONE 12 P20230314 (126.96.36.19991)
- Veeam ONE 11a (188.8.131.520)
- Veeam ONE 11 (184.108.40.2069)