Urgent Veeam Update Fixes Critical Authentication Bypass Flaw

Veeam has issued a critical update for the Backup Enterprise Manager following the discovery of a severe vulnerability identified as CVE-2024-29849. This flaw, which exists within the software’s authentication mechanisms, received a high severity score of 9.8 due to its potential to enable unauthenticated attackers to bypass login measures and impersonate any user. The impact of this vulnerability means that with no need for passwords or other security measures, cybercriminals could gain unrestricted access to the web interface, leaving sensitive data and backup systems exposed.

This high-risk vulnerability poses a serious threat to organizations relying on Veeam’s backup solutions, prompting the company to act promptly to mitigate the risks associated with the flaw. Given the critical nature of the issue, Veeam’s update version 12.1.2.172 addresses not only the authentication bypass but also several other security weaknesses that could potentially undermine the integrity of backup systems and user information.

Additional Security Enhancements

The recent Veeam update has remedied a collection of weaknesses beyond the headline authentication fault. CVE-2024-29850 is a second major concern, permitting NTLM relay attacks that could lead to full account takeovers. Another vulnerability patched in this update, CVE-2024-29851, involves the theft of NTLM hashes by privileged users in situations where service accounts are configured improperly. Furthermore, CVE-2024-29852 was corrected to prevent certain user roles from gaining unauthorized access to read backup session logs.

Acknowledging the gravity of these risks, the company has underscored the necessity for clients to apply the updates promptly. Such proactive measures can thwart opportunistic exploitation by malicious groups, some of which have historically leveraged similar vulnerabilities within Veeam software to deploy ransomware and execute extortion schemes. Users of the Veeam Backup Enterprise Manager are thus strongly advised to upgrade their systems to ensure their defenses are robust against such insidious attacks.

Importance of Proactive Cybersecurity

Veeam has swiftly rolled out an urgent update to its Backup Enterprise Manager in response to a critical vulnerability tagged as CVE-2024-29849. This flaw, notably within the authentication mechanisms, has been assessed with a high severity rating of 9.8. It allows attackers to evade authentication protocols and mimic any user. The risk of this vulnerability is significant as it enables cybercriminals to access the web interface without requiring passwords, thus exposing sensitive data and backup systems.

The seriousness of this threat to organizations using Veeam’s backup solutions has led the company to issue a quick response. The latest update, version 12.1.2.172, not only resolves the authentication bypass but also strengthens against various other potential security lapses that could jeopardize backup integrity and user data. Customers are urged to install this update promptly to safeguard their systems against possible cyber exploits.

Explore more

How AI Agents Work: Types, Uses, Vendors, and Future

From Scripted Bots to Autonomous Coworkers: Why AI Agents Matter Now Everyday workflows are quietly shifting from predictable point-and-click forms into fluid conversations with software that listens, reasons, and takes action across tools without being micromanaged at every step. The momentum behind this change did not arise overnight; organizations spent years automating tasks inside rigid templates only to find that

AI Coding Agents – Review

A Surge Meets Old Lessons Executives promised dazzling efficiency and cost savings by letting AI write most of the code while humans merely supervise, but the past months told a sharper story about speed without discipline turning routine mistakes into outages, leaks, and public postmortems that no board wants to read. Enthusiasm did not vanish; it matured. The technology accelerated

Open Loop Transit Payments – Review

A Fare Without Friction Millions of riders today expect to tap a bank card or phone at a gate, glide through in under half a second, and trust that the system will sort out the best fare later without standing in line for a special card. That expectation sits at the heart of Mastercard’s enhanced open-loop transit solution, which replaces

OVHcloud Unveils 3-AZ Berlin Region for Sovereign EU Cloud

A Launch That Raised The Stakes Under the TV tower’s gaze, a new cloud region stitched across Berlin quietly went live with three availability zones spaced by dozens of kilometers, each with its own power, cooling, and networking, and it recalibrated how European institutions plan for resilience and control. The design read like a utility blueprint rather than a tech

Can the Energy Transition Keep Pace With the AI Boom?

Introduction Power bills are rising even as cleaner energy gains ground because AI’s electricity hunger is rewriting the grid’s playbook and compressing timelines once thought generous. The collision of surging digital demand, sharpened corporate strategy, and evolving policy has turned the energy transition from a marathon into a series of sprints. Data centers, crypto mines, and electrifying freight now press