A vulnerability in Veeam Backup & Replication allows a low-privileged user with certain roles to perform remote code execution (RCE) by updating existing jobs. These jobs can be configured to run pre- and post-scripts, which can be located on a network share and are executed with elevated privileges by default. The user can update a job and schedule it to run almost immediately, allowing arbitrary code execution on the server.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-38805 A vulnerability in Veeam Backup & Replication allows a low-privileged user with certain roles to perform remote code execution (RCE) by updating existing jobs. These jobs can be configured to run pre- and post-scripts, which can be located on a network share and are executed with elevated privileges by default. The user can update a job and schedule it to run almost immediately, allowing arbitrary code execution on the server.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
History

Thu, 24 Apr 2025 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Veeam veeam Backup \& Replication
CPEs cpe:2.3:a:veeam:veeam_backup_\&_replication:*:*:*:*:*:*:*:*
Vendors & Products Veeam veeam Backup \& Replication
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Thu, 13 Mar 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-306

Wed, 04 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Veeam
Veeam backup And Replication
CPEs cpe:2.3:a:veeam:backup_and_replication:*:*:*:*:*:*:*:*
Vendors & Products Veeam
Veeam backup And Replication
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 04 Dec 2024 01:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in Veeam Backup & Replication allows a low-privileged user with certain roles to perform remote code execution (RCE) by updating existing jobs. These jobs can be configured to run pre- and post-scripts, which can be located on a network share and are executed with elevated privileges by default. The user can update a job and schedule it to run almost immediately, allowing arbitrary code execution on the server.
References
Metrics cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2025-03-13T17:40:27.483Z

Reserved: 2024-07-09T01:04:07.427Z

Link: CVE-2024-40717

cve-icon Vulnrichment

Updated: 2024-12-04T16:36:46.134Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-04T02:15:04.410

Modified: 2025-04-24T17:21:39.267

Link: CVE-2024-40717

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.