Veeam Recovery Orchestrator Vulnerability (CVE-2024-29855)
This article documents a vulnerability discovered in the Web Console component of Veeam Recovery Orchestrator.
This vulnerability does not affect other Veeam products (e.g., Veeam Backup & Replication, Veeam Agent for Microsoft Windows, Veeam ONE, Veeam Service Provider Console, etc.).
Issue Details
CVE-2024-29855
A vulnerability (CVE-2024-29855) in Veeam Recovery Orchestrator (VRO) version 7.0.0.337 allows an attacker to access the VRO web UI with administrative privileges.
Note: The attacker must know the exact username and role of an account that has an active VRO UI access token to accomplish the hijack.
Severity: Critical
CVSS 3.1 Score: 9.0CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Solution
The vulnerability discussed in this article was resolved starting in:
- Veeam Recovery Orchestrator 7.1.0.230
- Veeam Recovery Orchestrator 7.0.0.379
Deployment Information
The updated build number will only be displayed within the Programs & Features (appwiz.cpl) entry for Veeam Recovery Orchestrator. The build number shown within the UI and logs will still be listed as the previous version.
The build number displayed in the UI and logs will be updated in the next Veeam Recovery Orchestrator release.
For Veeam Recovery Orchestrator build 7.0.0.337
For environments operating VRO 7.0.0.337, either upgrade to 7.1.0.230 or install the following patch to update to build 7.0.0.379.
To update: download the patch (.msp) file and execute it on the VRO server using an Administrative Command Prompt or Administrative PowerShell console.
For Veeam Recovery Orchestrator build 7.1.0.205
For environments operating VRO 7.1.0.205, install the following patch to update to build 7.1.0.230.
To update: download the patch (.msp) file and execute it on the VRO server using an Administrative Command Prompt or Administrative PowerShell console.
To report a typo on this page, highlight the typo with your mouse and press CTRL + Enter.