Veeam Addresses Critical Flaw in Backup Enterprise Manager

Veeam Addresses Critical Flaw in Backup Enterprise Manager
Images are for illustrative purposes only and may not accurately represent reality

Veeam, a leading provider of backup solutions, has patched a critical vulnerability in its Veeam Backup Enterprise Manager (VBEM). The flaw, which was identified with a severity score of 9.8, is an authentication bypass issue that allowed unauthorized users to access any account on the platform.

The Importance of Updating to the Latest VBEM Version

VBEM is a crucial tool for large-scale and enterprise-level deployments, offering a central interface for managing multiple Veeam Backup & Replication servers. However, users should note that the vulnerability only affects specific deployments since VBEM is not enabled by default. Despite this, the company recommends all users to apply the patch immediately to ensure the security of their systems.

Alternative Solutions for Immediate Protection

For those unable to update their systems right away, Veeam advises disabling the VeeamEnterpriseManagerSvc and VeeamRESTSvc services or completely uninstalling the Veeam Backup Enterprise Manager. The first secure version is VBEM 12.1.2.172, and users can find uninstallation guidelines on Veeam's help page.

Additional Security Patches Released

Alongside the critical vulnerability, Veeam also addressed two other security issues. One vulnerability that could lead to account takeover via NTLM relay and another allowing high-privileged users to obtain the NTLM hash of the Veeam Backup Enterprise Manager service account.

Keep your backup systems secure by staying updated with the latest patches and protect your enterprise from potential threats.