CVE-2023-38549 allows an unprivileged user in Veeam ONE to acquire the NTLM hash of the Reporting Service account. Learn the impact, affected systems, and mitigation steps.
A vulnerability in Veeam ONE allows an unprivileged user to acquire the NTLM hash of the account used by the Veeam ONE Reporting Service when interacting with the Veeam ONE Web Client.
Understanding CVE-2023-38549
This CVE-2023-38549 vulnerability affects Veeam ONE, potentially allowing unauthorized users to access sensitive information.
What is CVE-2023-38549?
CVE-2023-38549 is a security vulnerability in Veeam ONE that enables an unprivileged user to obtain the NTLM hash of the account utilized by the Veeam ONE Reporting Service through the Veeam ONE Web Client.
The Impact of CVE-2023-38549
The criticality of this vulnerability is somewhat reduced as it necessitates interaction by a user with the Veeam ONE Administrator role. However, if successfully exploited, it could lead to unauthorized access to sensitive data and compromise the confidentiality of the affected systems.
Technical Details of CVE-2023-38549
This section dives deeper into the technical aspects of the CVE-2023-38549 vulnerability.
Vulnerability Description
The vulnerability allows an unprivileged user to extract the NTLM hash of the account used by the Veeam ONE Reporting Service via the Veeam ONE Web Client.
Affected Systems and Versions
Veeam ONE versions 11, 11a, and 12 are impacted by this vulnerability.
Exploitation Mechanism
The vulnerability can be exploited by an unprivileged user through interaction with the Veeam ONE Web Client, provided they have access to the Veeam ONE Administrator role.
Mitigation and Prevention
Protecting your systems from CVE-2023-38549 is crucial to maintaining the security of your infrastructure.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure timely installation of security patches provided by Veeam to address CVE-2023-38549 and other potential vulnerabilities.