Quantcast
Channel: Veeam Support Knowledge Base
Viewing all articles
Browse latest Browse all 4472

Vulnerability Scanner Detection Related to CVE-2024-7264

$
0
0

Vulnerability Scanner Detection Related to CVE-2024-7264

KB ID: 4718
Product: Veeam Backup & Replication
Published: 2025-04-02
Last Modified: 2025-04-02

Support Statement

This Veeam KB article was created to address customers' concerns regarding the detection of the libcurl library by their security software on VMware Backup Proxies, where the VMware VDDK package is installed. Libcurl is a component of VMware VDDK (Virtual Disk Development Kit), which Veeam Backup & Replication redistributes to enable the protection of VMware vSphere environments. Veeam Backup & Replication deploys the VMware VDDK package on VMware Backup Proxies for data movement.

Veeam Backup & Replication is not impacted by the vulnerability within the libcurl library included with VMware VDDK because Veeam Backup & Replication utilizes a separate dedicated curl library, which was updated to version 8.10.1 in Veeam Backup & Replication version 12.3. The libcurl file within the VMware VDDK package is only present because it is included as part of the VDDK library as a whole, and VMware has advised that "There is no risk of data leakage since VDDK does not expose curl's CURLINFO_CERTINFO, which is the component involved in the vulnerability." For this same reason, older versions of Veeam Backup & Replication that may have included old curl libraries are not affected, as Veeam Backup & Replication does not expose curl's CURLINFO_CERTINFO.

In July of 2024, a vulnerability (CVE-2024-7264) involving curl and libcurl was made public. Full details regarding this vulnerability can be found in the articles listed below.
To submit feedback regarding this article, please click this link: Send Article Feedback
To report a typo on this page, highlight the typo with your mouse and press CTRL + Enter.

Viewing all articles
Browse latest Browse all 4472

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>