#1 Global Leader in Data Protection & Ransomware Recovery

List of Security Fixes and Improvements in Veeam Backup for Nutanix AHV

KB ID: 4236
Product: Veeam Backup for Nutanix AHV | 2.1 | 3.0 | 4.0 | 5.0 | 5.1
Published: 2021-11-03
Last Modified: 2024-01-31
mailbox
Get weekly article updates
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam's Privacy Notice.

Cheers for trusting us with the spot in your mailbox!

Now you’re less likely to miss what’s been brewing in our knowledge base with this weekly digest

error icon

Oops! Something went wrong.

Please, try again later.

Purpose

This article describes all security-related fixes and improvements introduced in each release or update of Veeam Backup for Nutanix AHV.

This article aims to provide our customers' security and compliance teams with detailed information on security improvements between releases to help them decide whether it is critical to upgrade from their current Veeam Backup for Nutanix AHV version to a later one.

Security Fixes and Improvements

Veeam Backup for Nutanix AHV 5.1

  • AHV Proxy OS was upgraded to Ubuntu 22.04
  • traverse library was updated to 7.23.2
  • tough-cookie was updated to 4.1.3
  • System.Linq.Dynamic.Core was updated to 1.3.3
     

Veeam Backup for Nutanix AHV 4a

  • Upgraded OpenSSL to version 1.0.2zg
     

Veeam Backup for Nutanix AHV 4

  • AHV Proxy OS upgraded to Ubuntu 20.04
  • .NET Core updated to version 6
  • 3rd party components were updated
  • Added brute-force protection to REST API
  • Web App configuration has been improved, strict-transport-security header has been added
  • SMTP certificate validation added for email notifications
  • Newtonsoft.Json library has been updated to version 13.0.1
  • Google.Protobuf library has been updated to version 3.21.9
     

Veeam Backup for Nutanix AHV 3

  • AHV Proxy OS upgraded to Ubuntu 18.04
  • .NET Core updated to version 3.1
     

Veeam Backup for Nutanix AHV 2.1

  • AHV Backup Proxy no longer uses the following unsafe TLS ciphers:
    • TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA
    • TLS_ECDH_anon_WITH_AES_128_CBC_SHA
    • TLS_ECDH_anon_WITH_AES_256_CBC_SHA
    • TLS_ECDH_anon_WITH_RC4_128_SHA

More Information

As we're establishing this new process, we appreciate any feedback on the content or format of this KB article. Please let us know in the corresponding topic on the Veeam Community Forums. If your feedback is too sensitive to be shared publicly, please submit it by opening a support case. We highly appreciate your collaboration!
To submit feedback regarding this article, please click this link: Send Article Feedback
To report a typo on this page, highlight the typo with your mouse and press CTRL + Enter.

Spelling error in text

This site is protected by hCaptcha and its Privacy Policy and Terms of Service apply except as noted in our Privacy Policy.
Thank you!

Thank you!

Your feedback has been received and will be reviewed.

Oops! Something went wrong.

Please, try again later.

You have selected too large block!

Please try select less.

KB Feedback/Suggestion

This form is only for KB Feedback/Suggestions, if you need help with the software open a support case

By submitting, you are agreeing to have your personal information managed in accordance with the terms of Veeam's Privacy Notice.
This site is protected by hCaptcha and its Privacy Policy and Terms of Service apply except as noted in our Privacy Policy.
Verify your email to continue your product download
We've sent a verification code to:
  • Incorrect verification code. Please try again.
An email with a verification code was just sent to
Didn't receive the code? Click to resend in sec
Didn't receive the code? Click to resend
Thank you!

Thank you!

Your feedback has been received and will be reviewed.

error icon

Oops! Something went wrong.

Please, try again later.