Challenge
This article describes all security-related fixes and improvements introduced in each release or update of Veeam Backup & Replication.
Cause
The goal of this article is to provide our customers' security and compliance teams with the detailed information on security improvements between releases, in order to help them make an informed decision on whether it is critical to upgrade from their current Veeam Backup & Replication version to a latter one.
Solution
10.0.1.4854
- NAS Backup functionality can be used to gain unprivileged access to files on managed servers.
- Weak credentials encryption issue in guest processing command line parameter, and in a PowerShell cmdlet logs.
- Server and IIS version information is included the response header of the Veeam Backup Enterprise Manager web app.
- Security of Agent Management architecture has been improved.
- Security of Cloud Connect architecture has been improved.
- libcurl version has been updated to 7.70
10.0.0.4461
- A custom security descriptor was provided for the driver's control device (vulnerability reported by Mile Karry).
- Deserialization issues were fixed (vulnerability reported by Harrison Neal).
- A user authorization issue was fixed (vulnerability reported by Harrison Neal).
- Security of the Enterprise Manager Web App configuration was improved.
- Support for weak SSH ciphers was disabled in the recovery media ISOs.
- OpenSSL library was updated to version 1.0.2t
- Putty was updated to version 0.73
- Weak TLS ciphers were disabled in Surebackup Linux appliance.
More Information
As we're establishing this new process, we appreciate any feedback on the content or format of this KB article. Please let us know in the
corresponding topic on the Veeam Community Forums. If your feedback is
too sensitive to be shared publicly, please submit it by
opening a support case. We highly appreciate your collaboration!