iTnews Asia
  • Home
  • News
  • Security

Veeam patches ONE monitoring platform

Veeam patches ONE monitoring platform

Possible server RCE.

By Richard Chirgwin on Nov 9, 2023 10:58AM

Veeam has warned against a vulnerability that could give an attacker remote code execution (RCE) on the SQL server of its Veeam ONE monitoring platform.

Veeam ONE 11, 11a and 12 is also used in versions 5 and 6 of the company’s disaster recovery orchestrator, and version 4 of its availability orchestrator.

According to the company’s advisory, CVE-2023-38547 (CVSS score of 9.9) “allows an unauthenticated user to gain information about the SQL server connection Veeam ONE uses to access its configuration database.”

An attacker who gains that information could get RCE on the server hosting the configuration database.

A second critical vulnerability, CVE-2023-38548 (CVSS score 9.8), lets an unprivileged user with access to the Veeam ONE Web client obtain the Microsoft "NTLM hash of the account used by the Veeam ONE Reporting Service.”

There are also two lower-rated vulnerabilities the company patched earlier this week.

CVE-2023-38549 (CVSS score 4.5) carries a lower-rating because it’s only exploitable by an attacker with a Veeam ONE Power User role. The attacker could use a cross-site scripting (XSS) attack to get the access token of an administrator.

In CVE-2023-41723 (CVSS score 4.3), someone with read-only privileges could view the software’s dashboard schedule.

The company noted that vulnerability testing was only conducted against currently supported versions of its software.

The patches are provided as hotfix files that need the Veeam ONE monitoring and reporting services to be stopped and restarted.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
security veeam

Related Articles

  • Identity is now the new cybersecurity battlefield
  • Why APAC organisations must rethink their cloud and AI security
  • Why is fragmentation the next big cybersecurity risk?
  • The maritime sector is now in the crosshairs of cybercriminals
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Identity is now the new cybersecurity battlefield

Identity is now the new cybersecurity battlefield

Why APAC organisations must rethink their cloud and AI security

Why APAC organisations must rethink their cloud and AI security

Tips on how to harness AI to transform your DDoS protection into proactive cyber defence

Tips on how to harness AI to transform your DDoS protection into proactive cyber defence

Malaysia's Maxis Berhad investigates claims on alleged data breach

Malaysia's Maxis Berhad investigates claims on alleged data breach

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.