An explanation-of-concept (PoC) exploit for a Veeam Backup Endeavor Supervisor authentication bypass flaw tracked as CVE-2024-29849 is now publicly to be had, making it pressing that admins practice the newest safety updates.
Veeam Backup Endeavor Supervisor (VBEM) is a web based platform for managing Veeam Backup & Replication installations by way of a internet console. It is helping keep watch over backup jobs and carry out recovery operations throughout a company’s backup infrastructure and large-scale deployments.
Veeam issued a safety bulletin in regards to the crucial flaw on Might 21, caution a few crucial vulnerability enabling far off unauthenticated attackers to log in to VBEM’s internet interface as any person.
The seller instructed its shoppers to handle the issue by way of upgrading to VBEM model 12.1.2.172, whilst additionally sharing mitigation guidelines for the ones not able to use the replace straight away.
Exploit main points
In a technical writeup by way of Sina Kheirkha, the cybersecurity researcher explains that the flaw lies within the ‘Veeam.Backup.Endeavor.RestAPIService.exe’ carrier, which listens on TCP port 9398, functioning as a REST API server for the principle internet utility.
The exploit comes to sending a specifically crafted VMware single-sign-on (SSO) token to the susceptible carrier the use of the Veeam API.
The token incorporates an authentication request that impersonates an administrator person and an SSO carrier URL that Veeam, crucially, does not check.
The base64-encoded SSO token is decoded and interpreted in XML shape to ensure its validity by way of a SOAP request to an attacker-controlled URL.
This rogue server arrange by way of the attacker responds undoubtedly to validation requests, so Veeam accepts the authentication request and provides administrator get entry to to the attacker.

Supply: summoning.staff
The equipped exploit demonstrates the entire steps to take advantage of the vulnerability, together with putting in a callback server, sending the crafted token, and retrieving a listing of document servers as evidence of a hit exploitation.
Addressing the hazards
Even if no in-the-wild exploitation of CVE-2024-29849 has been reported but, the general public availability of a running exploit may trade this in a little while. Subsequently, updating to model 12.1.2.172 or later once conceivable is significant.
The ones not able to patch will have to observe those suggestions:
- Prohibit get entry to to the VBEM internet interface by way of proscribing community get entry to to just relied on IP addresses.
- Put in force firewall laws to dam unauthorized get entry to to the ports utilized by Veeam services and products (e.g., port 9398 for the REST API).
- Allow multi-factor authentication for all accounts gaining access to VBEM.
- Deploy a Internet Software Firewall to lend a hand stumble on and block malicious requests focused on VBEM.
- Incessantly track and audit get entry to logs for any suspicious or unauthorized get entry to makes an attempt, and arrange signals for login makes an attempt from untrusted IP addresses.
- Isolate the VBEM server from different crucial techniques inside your community to include lateral motion chance.