Vulnerabilities in Veeam ONE Agent components residing on Veeam ONE and Veeam Backup & Replication servers allow executing malicious code remotely without authentication. This may lead to gaining control over the target system. Severity of the vulnerabilities is critical, CVSS v3 score is 9.8.
Veeam ONE Agent uses .NET data serialization mechanisms. The remote attacker may send malicious code to the TCP port opened by Veeam ONE Agent (TCP 2805 by default) which will not be deserialized properly. The deserialization of untrusted data is performed during TLS Handshake (vulnerability tracked as ZDI-CAN-10400 and CVE-2020-10914) and during logging of error messages (vulnerability tracked as ZDI-CAN-10401 and CVE-2020-10915).
Hotfixes are available for the following Veeam ONE versions:
- 10 (build 10.0.0.750)
- 9.5 Update 4a (build 126.96.36.19987)
The hotfix must be installed on the Veeam ONE server. Veeam ONE Agents on the Veeam Backup & Replication servers will be updated automatically after installing the hotfix. After applying the updates your Veeam ONE Agent version will be 10.0.1.750 on Veeam ONE version 10 servers and 188.8.131.5287 on Veeam ONE 9.5 Update 4a servers.
Please note, that all new deployments of Veeam ONE version 10 and version 9.5 Update 4a installed using the ISO images downloaded after 04/15/2020 are not vulnerable.
Michael Zanetta & Edgar Boda-Majer from Bugscale working with Trend Micro Zero Day Initiative.
[[DOWNLOAD|DOWNLOAD HOTFIX FOR Veeam ONE 10|https://www.veeam.com/download_add_packs/virtualization-management-one-solution/10.0.0.750_KB3144/]]
[[DOWNLOAD|DOWNLOAD HOTFIX FOR Veeam ONE 9.5 U4a|https://www.veeam.com/download_add_packs/virtualization-management-one-solution/184.108.40.20687_KB3144/]]
Please be aware that we’re making changes which will restrict access to product updates for users without an active contract.