Home Veeam CVE-2024-40713
Back to Veeam

CVE-2024-40713

Veeam Backup & Replication - Multi-Factor Authentication (MFA) Component

Veeam CVSS 7.8 Updated April 6, 2026

Executive Risk Summary

"A vulnerability in Veeam Backup & Replication allows a low-privileged user to alter MFA settings and bypass MFA, potentially leading to unauthorized access to sensitive data. This vulnerability can be exploited by an attacker with a low-privileged role within the Veeam Backup & Replication system."

Anticipated Attack Path

  1. 1. Low-privileged user gains access to Veeam Backup & Replication system
  2. 2. User alters MFA settings to bypass authentication
  3. 3. Attacker gains unauthorized access to sensitive data

Am I Vulnerable?

  • Verify MFA settings for all users
  • Review system logs for suspicious activity
  • Apply patch from Veeam to fix vulnerability

Operational Audit Arsenal

Target Type Windows Service
Target Asset VeeamBackupSvc
Standard Path C:\Program Files\Veeam\Backup and Replication\

Manual Verification Required

This is a non-Windows asset (Veeam). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Potential disruption to backup and replication services during patch application

Internal Work Notes

CVE-2024-40713: Veeam Backup & Replication MFA Bypass Vulnerability - Apply patch from Veeam to prevent unauthorized access

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Veeam Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.