• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

Exploit released for Veeam bug allowing cleartext credential theft

Sergiu Gatlan by Sergiu Gatlan
March 23, 2023
Reading Time: 2 mins read
0
Veeam fixes bug that lets hackers breach backup infrastructure

Veeam

RELATED POSTS

Online sellers targeted by new information-stealing malware campaign

Zyxel shares tips on protecting firewalls from ongoing attacks

Microsoft is killing Cortana on Windows starting late 2023

Cross-platform exploit code is now available for a high-severity Backup Service vulnerability impacting Veeam’s Backup & Replication (VBR) software.

The flaw (CVE-2023-27532) affects all VBR versions and can be exploited by unauthenticated attackers to breach backup infrastructure after stealing cleartext credentials and gaining remote code execution as SYSTEM.

Veeam released security updates to address this vulnerability for VBR V11 and V12 on March 7, advising customers using older releases to upgrade to secure vulnerable devices running unsupported releases.

“We have developed patches for V11 and V12 to mitigate this vulnerability and we recommend you update your installations immediately,” the company warned.

The company also shared a temporary fix for admins who couldn’t immediately deploy the patches, which requires blocking external connections to port TCP 9401 using the backup server firewall to remove the attack vector.

Veeam says its VBR software is used by more than 450,000 customers worldwide, including 82% of Fortune 500 companies and 72% of Global 2,000.

Buy JNews
ADVERTISEMENT

Today, just over two weeks after Veeam released CVE-2023-27532 patches, Horizon3’s Attack Team published a technical root cause analysis for this high-severity vulnerability.

They also released cross-platform proof-of-concept (PoC) exploit code that allows obtaining credentials in plaintext from the VBR configuration database by abusing an unsecured API endpoint.

Horizon3 CVE-2023-27532 PoC

​”We have released our POC on Github, which is built on .NET core and capable of running on Linux, making it accessible to a wider audience,” Horizon3 vulnerability researcher James Horseman said.

“It is important to note that this vulnerability should be taken seriously and patches should be applied as soon as possible to ensure the security of your organization.”

Last week, Huntress security researchers shared a video demo of their own PoC exploit capable of dumping cleartext credentials and achieving arbitrary code execution via additional API calls that could be weaponized.

“While the unauthenticated credential dump acts as a vector for lateral movement or post-exploitation, the vulnerability in question can also be used for unauthenticated remote code execution — turning the vulnerable Veeam instance itself into a vector for initial access or further compromise,” Huntress Labs security researchers John Hammond explained.

Out of 2 million endpoints running its agent software, Huntress said it detected more than 7,500 hosts running Veeam Backup & Replication software vulnerable to CVE-2023-27532 exploits.

Although there are no reports of threat actors leveraging this vulnerability and no attempts to exploit it in the wild, attackers will likely create their own exploits based on the PoC code published by Horizon3 researchers to target Internet-exposed Veeam servers.

Share54Tweet34Pin12
Sergiu Gatlan

Sergiu Gatlan

Related Posts

Beware: Hackers now use OneNote attachments to spread malware
Cyber Security

Online sellers targeted by new information-stealing malware campaign

June 3, 2023
Zyxel warns of critical vulnerabilities in firewall and VPN devices
Cyber Security

Zyxel shares tips on protecting firewalls from ongoing attacks

June 3, 2023
Microsoft is killing Cortana on Windows starting late 2023
Cyber Security

Microsoft is killing Cortana on Windows starting late 2023

June 2, 2023
Hackers use new, fake crypto app to breach networks, steal cryptocurrency
Cyber Security

The Week in Ransomware – June 2nd 2023 – Whodunit?

June 2, 2023
Microsoft fixes Windows 11 22H2 file copy performance hit
Cyber Security

Windows 11 to require SMB signing to prevent NTLM relay attacks

June 2, 2023
FBI warns of spike in ‘pig butchering’ crypto investment schemes
Cyber Security

NSA and FBI: Kimsuky hackers pose as journalists to steal intel

June 2, 2023

Recommended Stories

ETH bursts past $2000, here’s where buyers can look to re-enter

ETH bursts past $2000, here’s where buyers can look to re-enter

April 16, 2023
AT&T alerts 9 million customers of data breach after vendor hack

AT&T alerts 9 million customers of data breach after vendor hack

March 9, 2023
Chinese hackers use Google Drive to drop malware on govt networks

Chinese hackers use Google Drive to drop malware on govt networks

November 18, 2022

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • New Windows Server updates cause domain controller freezes, restarts

    136 shares
    Share 54 Tweet 34
  • Bing Chat’s secret modes turn it into a personal assistant or friend

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • How Blur achieved a new milestone from an unexpected source
  • Why Bitcoin will not retest $20,000 anytime soon
  • TRON bulls could push for another 5% hike given…

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?