Home Veeam CVE-2024-42456
Back to Veeam

CVE-2024-42456

Veeam Backup & Replication - Configuration Settings

Veeam CVSS 8.8 Updated April 6, 2026

Executive Risk Summary

"A vulnerability in Veeam Backup & Replication platform allows a low-privileged user to exploit a method that updates critical configuration settings, potentially resulting in unauthorized access. This can enable the user to call privileged methods and initiate critical services due to insufficient permission requirements on the method."

Anticipated Attack Path

  1. 1. Low-privileged user exploits the vulnerable method
  2. 2. User updates critical configuration settings, such as the trusted client certificate
  3. 3. User gains unauthorized access to privileged methods and services

Am I Vulnerable?

  • Verify the Veeam Backup & Replication version and apply the necessary patch
  • Review user roles and permissions to ensure least privilege access
  • Monitor system logs for suspicious activity related to configuration setting updates

Operational Audit Arsenal

Target Type Service
Target Asset Veeam.Backup.Core.exe
Standard Path C:\Program Files\Veeam\Backup and Replication\

Manual Verification Required

This is a non-Windows asset (Veeam). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Potential disruption to backup and replication services during patching

Internal Work Notes

Veeam Backup & Replication vulnerability (CVE-2024-42456) - Low-privileged user can exploit method to update critical configuration settings, potentially gaining unauthorized access.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Veeam Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.