Press ESC to close

Veeam Service Provider Console (VSPC) Users Urged to Patch CVE-2024-42448 and CVE-2024-42449

CategoryDetails
Threat ActorsPotential exploitation by threat actors leveraging RCE and privilege escalation vulnerabilities.
Campaign OverviewVeeam released patches addressing critical RCE and file manipulation vulnerabilities in Service Provider Console.
Target Regions (Or Victims)Organizations utilizing Veeam Service Provider Console for backup and disaster recovery operations.
MethodologyExploits RCE for unauthorized control and uses NTLM hash extraction for privilege escalation.
Product TargetedVeeam Service Provider Console (VSPC), versions 8.1.0.21377 and earlier.
Malware ReferenceNot directly referenced; highlights potential for malware deployment or ransomware.
Tools UsedExploitation of vulnerabilities CVE-2024-42448 and CVE-2024-42449.
Vulnerabilities ExploitedCVE-2024-42448 (RCE, CVSS 9.9), CVE-2024-42449 (NTLM hash extraction, CVSS 7.1).
TTPsExploits RCE for system compromise, NTLM hash theft for lateral movement, and file deletion for operational disruption.
AttributionNo direct attribution to specific threat groups; prior Veeam vulnerabilities were exploited by Akira, Fog, and Frag ransomware groups.
RecommendationsUpgrade to VSPC version 8.1.0.21999, apply patches immediately, and discontinue unsupported versions.
SourceSocRadar

Read full article: https://socradar.io/veeam-service-provider-console-vspc-cve-2024-42448/
Disclaimer: The above summary has been generated by an AI language model

Source: SOCRadar

Published on: December 4, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *