Home Veeam CVE-2024-40717
Back to Veeam

CVE-2024-40717

Veeam Backup & Replication - Job Scheduler

Veeam CVSS 8.8 Updated April 6, 2026

Executive Risk Summary

"A low-privileged user with certain roles can perform remote code execution (RCE) by updating existing jobs in Veeam Backup & Replication, potentially leading to arbitrary code execution on the server. This vulnerability can be exploited by scheduling a job to run almost immediately, allowing an attacker to execute malicious code with elevated privileges."

Anticipated Attack Path

  1. 1. Low-privileged user gains access to Veeam Backup & Replication
  2. 2. User updates an existing job with malicious pre- or post-scripts
  3. 3. Job is scheduled to run, executing the malicious scripts with elevated privileges

Am I Vulnerable?

  • Verify user roles and permissions in Veeam Backup & Replication
  • Monitor job updates and schedules for suspicious activity
  • Implement additional security controls, such as network share restrictions and script validation

Operational Audit Arsenal

Target Type Windows Service
Target Asset VeeamBackupSvc
Standard Path C:\Program Files\Veeam\Backup and Replication\

Manual Verification Required

This is a non-Windows asset (Veeam). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Potential disruption to backup and replication services during patching

Internal Work Notes

Veeam Backup & Replication vulnerability (CVE-2024-40717) - low-privileged user RCE via job updates, requires immediate patching and security review

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Veeam Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.