Home Veeam CVE-2024-42455
Back to Veeam

CVE-2024-42455

Veeam Backup & Replication - Remoting Services

Veeam CVSS 8.1 Updated April 6, 2026

Executive Risk Summary

"A vulnerability in Veeam Backup & Replication allows a low-privileged user to connect to remoting services and exploit insecure deserialization, potentially allowing the deletion of any file on the system with service account privileges. This vulnerability is caused by an insufficient blacklist during the deserialization process, highlighting a critical risk to data integrity and system security."

Anticipated Attack Path

  1. 1. Initial Access: Low-privileged user gains access to the system
  2. 2. Exploitation: Insecure deserialization is exploited through remoting services
  3. 3. Privilege Escalation: Service account privileges are leveraged to delete files

Am I Vulnerable?

  • Verify the version of Veeam Backup & Replication for vulnerability
  • Assess the impact of potential file deletion on system and data integrity
  • Apply the patch or workaround as recommended by Veeam

Operational Audit Arsenal

Target Type Windows Service
Target Asset Veeam.Backup.Manager.Service.exe
Standard Path C:\Program Files\Veeam\Backup and Replication\

Manual Verification Required

This is a non-Windows asset (Veeam). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Potential disruption to backup and replication services during patch application

Internal Work Notes

CVE-2024-42455: Veeam Backup & Replication vulnerability allowing file deletion with service account privileges. Apply patch from KB4693 to mitigate risk.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Veeam Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.