Home Veeam CVE-2024-42452
Back to Veeam

CVE-2024-42452

Veeam Backup & Replication - Agent

Veeam CVSS 8.8 Updated April 6, 2026

Executive Risk Summary

"A vulnerability in Veeam Backup & Replication allows a low-privileged user to start an agent remotely in server mode and obtain credentials, effectively escalating privileges to system-level access. This vulnerability enables an attacker to upload files to the server with elevated privileges, leading to full system compromise."

Anticipated Attack Path

  1. 1. Initial Exploitation: Low-privileged user starts agent remotely in server mode
  2. 2. Privilege Escalation: Obtains credentials for system-level access
  3. 3. Post-Exploitation: Uploads files to the server with elevated privileges

Am I Vulnerable?

  • Verify Veeam Backup & Replication version and patch level
  • Check for unusual agent activity and file uploads
  • Review system logs for signs of privilege escalation

Operational Audit Arsenal

Target Type Service
Target Asset Veeam.Backup.Service
Standard Path C:\Program Files\Veeam\Backup and Replication\

Manual Verification Required

This is a non-Windows asset (Veeam). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Potential disruption to backup and replication services during patching

Internal Work Notes

CVE-2024-42452: Veeam Backup & Replication vulnerability allowing privilege escalation and file upload with elevated privileges. Patching and verification required.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Veeam Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.