https://login.veeam.com/en/oauth?client_id=nXojRrypJ8&redirect_uri=https%3A%2F%2Fwww.veeam.com%2Fservices%2Fauthentication%2Fredirect_url&response_type=code&scope=profile&state=eyJmaW5hbFJlZGlyZWN0TG9jYXRpb24iOiJodHRwczovL3d3dy52ZWVhbS5jb20va2IzMTAzIiwiaGFzaCI6ImIwNTgwNDhjLTliN2MtNDM2My05Y2NjLTVmNzVjZjZkYWVhYyJ9
1-800-691-1991 | 9am - 8pm ET
EN

List of security fixes and improvements in Veeam Backup & Replication

KB ID: 3103
Product: Veeam Backup & Replication, Veeam Cloud Connect
Version: 10.0
Published: 2020-03-02
Last Modified: 2021-03-04

Challenge

This article describes all security-related fixes and improvements introduced in each release or update of Veeam Backup & Replication.

Cause

The goal of this article is to provide our customers' security and compliance teams with the detailed information on security improvements between releases, in order to help them make an informed decision on whether it is critical to upgrade from their current Veeam Backup & Replication version to a latter one.

Solution

11.0.0.837
  • Vulnerability in the deserialization logic has been fixed.
  • .NET remoting communication security has been improved.
  • Data Mover communication protocol security has been improved.
  • Agent Management architecture security has been improved.
  • Veeam Explorers integration security has been improved
  • Veeam Backup Enterprise Manager Web App configuration and headers security has been improved.
  • Addressed issues which could cause sensitive information logged in certain circumstances.
  • Third-party libraries in FLR and SureBackup helper appliance have been updated to current versions.
  • Sustansys.Saml2 has been updated to version 2.7 to address known vulnerabilities.
  • LZ4 compression library version has been updated to version 1.9.2
 
10.0.1.4854
  • NAS Backup functionality can be used to gain unprivileged access to files on managed servers.
  • Weak credentials encryption issue in guest processing command line parameter, and in a PowerShell cmdlet logs.
  • Server and IIS version information is included the response header of the Veeam Backup Enterprise Manager web app.
  • Security of Agent Management architecture has been improved.
  • Security of Cloud Connect architecture has been improved.
  • libcurl version has been updated to 7.70
 

10.0.0.4461

  • A custom security descriptor was provided for the driver's control device (vulnerability reported by Mile Karry).
  • Deserialization issues were fixed (vulnerability reported by Harrison Neal).
  • A user authorization issue was fixed (vulnerability reported by Harrison Neal).
  • Security of the Enterprise Manager Web App configuration was improved.
  • Support for weak SSH ciphers was disabled in the recovery media ISOs.
  • OpenSSL library was updated to version 1.0.2t
  • Putty was updated to version 0.73
  • Weak TLS ciphers were disabled in Surebackup Linux appliance.

More information

As we're establishing this new process, we appreciate any feedback on the content or format of this KB article. Please let us know in the corresponding topic on the Veeam Community Forums. If your feedback is too sensitive to be shared publicly, please submit it by opening a support case. We highly appreciate your collaboration!
KB ID: 3103
Product: Veeam Backup & Replication, Veeam Cloud Connect
Version: 10.0
Published: 2020-03-02
Last Modified: 2021-03-04

Couldn't find what you were looking for?

Below you can submit an idea for a new knowledge base article.
Report a typo on this page:

Please select a spelling error or a typo on this page with your mouse and press CTRL + Enter to report this mistake to us. Thank you!

Spelling error in text

Knowledge base content request
By submitting, you agree that your personal data will be managed by Veeam in accordance with the Privacy Policy.

ty icon

Thank you!

We have received your request and our team will reach out to you shortly.

OK

error icon

Oops! Something went wrong.

Please go back try again later.