Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-15518 : Security Advisory and Response

Learn about CVE-2020-15518, a vulnerability in Veeam Availability Suite and Veeam Backup & Replication before version 10, allowing unprivileged users to control filesystem I/O requests. Find mitigation steps and prevention measures.

VeeamFSR.sys in Veeam Availability Suite before 10 and Veeam Backup & Replication before 10 has a vulnerability that allows unprivileged users to gain total control over filesystem I/O requests.

Understanding CVE-2020-15518

This CVE identifies a security issue in Veeam software that could be exploited by attackers to manipulate filesystem I/O requests.

What is CVE-2020-15518?

The vulnerability in VeeamFSR.sys in Veeam Availability Suite and Veeam Backup & Replication versions prior to 10 enables unprivileged users to attain complete control over filesystem I/O requests.

The Impact of CVE-2020-15518

The lack of device object DACL in the affected Veeam software versions allows unauthorized users to potentially compromise the integrity and confidentiality of filesystem operations.

Technical Details of CVE-2020-15518

This section provides more in-depth technical insights into the vulnerability.

Vulnerability Description

VeeamFSR.sys in Veeam Availability Suite and Veeam Backup & Replication before version 10 lacks device object DACL, leading to unauthorized control over filesystem I/O requests.

Affected Systems and Versions

        Product: Veeam Availability Suite
        Product: Veeam Backup & Replication
        Versions affected: Before version 10

Exploitation Mechanism

The vulnerability allows unprivileged users to manipulate filesystem I/O requests, potentially leading to unauthorized access and control.

Mitigation and Prevention

Protecting systems from CVE-2020-15518 requires immediate actions and long-term security practices.

Immediate Steps to Take

        Update Veeam Availability Suite and Veeam Backup & Replication to version 10 or above.
        Monitor filesystem activities for any suspicious behavior.

Long-Term Security Practices

        Implement the principle of least privilege to restrict unauthorized access.
        Regularly audit and review filesystem permissions and controls.

Patching and Updates

        Apply patches and updates provided by Veeam to address the vulnerability and enhance system security.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now