CVE-2024-29851

Veeam Backup Enterprise Manager allows high-privileged users to steal NTLM hash of Enterprise manager service account.
References
Link Resource
https://veeam.com/kb4581 Vendor Advisory
https://veeam.com/kb4581 Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:veeam:veeam_backup_\&_replication:*:*:*:*:*:*:*:*

History

03 Jul 2025, 16:11

Type Values Removed Values Added
First Time Veeam
Veeam veeam Backup \& Replication
References () https://veeam.com/kb4581 - () https://veeam.com/kb4581 - Vendor Advisory
CPE cpe:2.3:a:veeam:veeam_backup_\&_replication:*:*:*:*:*:*:*:*

21 Nov 2024, 09:08

Type Values Removed Values Added
References () https://veeam.com/kb4581 - () https://veeam.com/kb4581 -

19 Sep 2024, 02:35

Type Values Removed Values Added
Summary
  • (es) Veeam Backup Enterprise Manager permite a los usuarios con altos privilegios robar el hash NTLM de la cuenta de servicio de Enterprise Manager.
CWE CWE-294

22 May 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-22 23:15

Updated : 2025-07-03 16:11


NVD link : CVE-2024-29851

Mitre link : CVE-2024-29851

CVE.ORG link : CVE-2024-29851


JSON object : View

Products Affected

veeam

  • veeam_backup_\&_replication
CWE
CWE-294

Authentication Bypass by Capture-replay