7.5
CVSSv3

CVE-2023-27532

Published: 10/03/2023 Updated: 16/03/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

Vulnerability in Veeam Backup & Replication component allows encrypted credentials stored in the configuration database to be obtained. This may lead to gaining access to the backup infrastructure hosts.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

veeam backup \\& replication 11.0.1.1261

veeam backup \\& replication 12.0.0.1420

Github Repositories

Exploit for CVE-2023-27532 against Veeam Backup & Replication

CVE-2023-27532 Proof of Concept code to exploit CVE-2023-27532 and either leak plaintext credentials or perform remote command execution Overview For a detailed analysis of the vulnerability and exploitation please read the Rapid7 AttackerKB Analysis Building Open in Visual Studio You will need to either add or update the references to VeeamBackupCommondll, VeeamBackupI

POC for Veeam Backup and Replication CVE-2023-27532

CVE-2023-27532 POC for CVE-2023-27532 affecting Veeam Backup and Replication Technical Analysis A technical root cause analysis of the vulnerability can be found on our blog: wwwhorizon3ai/veeam-backup-and-replication-cve-2023-27532-deep-dive Summary This POC abuses an unsecured API endpoint to extract credentials Usage /home/dev/RiderProjects/Veeam_CVE-2023-27532/CV

CVE-2023-27532 Proof of Concept code to exploit CVE-2023-27532 and either leak plaintext credentials or perform remote command execution Overview For a detailed analysis of the vulnerability and exploitation please read the Rapid7 AttackerKB Analysis Building Open in Visual Studio You will need to either add or update the references to VeeamBackupCommondll, VeeamBackupI

Recent Articles

IT threat evolution in Q3 2023. Non-mobile statistics
Securelist • AMR • 01 Dec 2023

These statistics are based on detection verdicts of Kaspersky products and services received from users who consented to providing statistical data. Quarterly figures According to Kaspersky Security Network, in Q3 2023: Kaspersky solutions blocked 694,400,301 attacks from online resources across the globe. A total of 169,194,807 unique links were recognized as malicious by Web Anti-Virus components. Attempts to run malware for stealing money from online bank accounts were stopped on the com...