#1 Global Leader in Data Protection & Ransomware Recovery

List of Security Fixes and Improvements in Veeam Backup & Replication

KB ID: 3103
Product: Veeam Backup & Replication | 10 | 11 | 12 | 12.1
Veeam Cloud Connect | 10 | 11 | 12
Published: 2020-03-02
Last Modified: 2024-03-13
mailbox
Get weekly article updates
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam's Privacy Notice.

Cheers for trusting us with the spot in your mailbox!

Now you’re less likely to miss what’s been brewing in our knowledge base with this weekly digest

error icon

Oops! Something went wrong.

Please try again later.

Purpose

This article describes all security-related fixes and improvements introduced in each release or update of Veeam Backup & Replication.

The goal of this article is to provide our customers' security and compliance teams with detailed information on security improvements between releases, in order to help them make an informed decision on whether it is critical to upgrade from their current Veeam Backup & Replication version to a latter one.

Security Fixes and Improvements

12.1.1.56

  • PuTTY updated to version 0.80
     

12.1.0.2131

  • OpenSSL library updated to 1.0.2zi
  • LZ4 library updated to 1.9.4
  • curl updated to 8.0.1
  • Azure Identity package updated to 1.10.2
  • Stronger backup encryption (see What's New in 12.1 p.7)
  • Enhanced protection for stored credentials  (see What's New in 12.1 p.7)
     

12.0.0.1420 P20230412

  • OpenSSL Library updated to the newest version (1.0.2zg).
     

12.0.0.1420 P20230223

  • Vulnerability (CVE-2023-27532) in Veeam Backup Service was fixed.
    This vulnerability was reported by Shanigen.
     

12.0.0.1420

11.0.1.1261 P20240304

  • VMware Virtual Disk Development Kit (VDDK) was updated to 7.0.3.4.
  • OpenSSL was updated to v1.0.2zi.
  • liblz4 was updated to v1.9.4.
  • zlib was updated to v1.2.13.
  • PuTTY was updated to 0.80.
     

11.0.1.1261 P20230227

  • Vulnerability (CVE-2023-27532) in Veeam Backup Service was fixed.
    This vulnerability was reported by Shanigen.
     

11.0.1.1261 P20220302

11.0.1.1261

  • Linux data mover: Added support for ECDHE TLS cipher suites; improved transport security.
  • Veeam Backup Enterprise Manager: hardened HTTP header configuration; disabled HTTP Trace method; restricted an ability to log into the Self-Service Restore Portal under NETWORK SERVICE accounts (the portal was dysfunctional for such logins).
  • Helper appliances: updated OpenVPN to version 2.4.11; updated OpenSSH to version 8.6.
  • Debug logs: Addressed issues which could result in sensitive information logged under certain circumstances.
     

11.0.0.837 P20210507

  • Vulnerability (CVE-2021-35971) in the deserialization logic of Microsoft .NET remoting has been fixed.
     

11.0.0.837

  • .NET remoting communication security has been improved.
  • Data Mover communication protocol security has been improved.
  • Agent Management architecture security has been improved.
  • Veeam Explorers integration security has been improved
  • Veeam Backup Enterprise Manager Web App configuration and headers security has been improved.
  • Addressed issues which could cause sensitive information logged in certain circumstances.
  • Third-party libraries in FLR and SureBackup helper appliance have been updated to current versions.
  • Sustansys.Saml2 has been updated to version 2.7 to address known vulnerabilities.
  • LZ4 compression library version has been updated to version 1.9.2
     

10.0.1.4854 P20220304

10.0.1.4854 P20210609

  • Vulnerability (CVE-2021-35971) in the deserialization logic of Microsoft .NET remoting has been fixed.
     

10.0.1.4854

  • NAS Backup functionality can be used to gain unprivileged access to files on managed servers.
  • Weak credentials encryption issue in guest processing command line parameter and in PowerShell cmdlet logs.
  • Server and IIS version information is included in the response header of the Veeam Backup Enterprise Manager web app.
  • Security of Agent Management architecture has been improved.
  • Security of Cloud Connect architecture has been improved.
  • libcurl version has been updated to 7.70
     

10.0.0.4461

  • A custom security descriptor was provided for the driver's control device (vulnerability reported by Mile Karry).
  • Deserialization issues were fixed (vulnerability reported by Harrison Neal).
  • A user authorization issue was fixed (vulnerability reported by Harrison Neal).
  • Security of the Enterprise Manager Web App configuration was improved.
  • Support for weak SSH ciphers was disabled in the recovery media ISOs.
  • OpenSSL library was updated to version 1.0.2t
  • Putty was updated to version 0.73
  • Weak TLS ciphers were disabled in the Surebackup Linux appliance.

More Information

As we're establishing this new process, we appreciate any feedback on the content or format of this KB article. Please let us know in the corresponding topic on the Veeam Community Forums. If your feedback is too sensitive to be shared publicly, please submit it by opening a support case. We highly appreciate your collaboration!
To submit feedback regarding this article, please click this link: Send Article Feedback
To report a typo on this page, highlight the typo with your mouse and press CTRL + Enter.

Spelling error in text

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Thank you!

Thank you!

Your feedback has been received and will be reviewed.

Oops! Something went wrong.

Please try again later.

You have selected too large block!

Please try select less.

KB Feedback/Suggestion

This form is only for KB Feedback/Suggestions, if you need help with the software open a support case

By submitting, you are agreeing to have your personal information managed in accordance with the terms of Veeam's Privacy Notice.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Verify your email to continue your product download
We've sent a verification code to:
  • Incorrect verification code. Please try again.
An email with a verification code was just sent to
Didn't receive the code? Click to resend in sec
Didn't receive the code? Click to resend
Thank you!

Thank you!

Your feedback has been received and will be reviewed.

error icon

Oops! Something went wrong.

Please try again later.