CVE-2023-38549

A vulnerability in Veeam ONE allows an unprivileged user who has access to the Veeam ONE Web Client the ability to acquire the NTLM hash of the account used by the Veeam ONE Reporting Service. Note: The criticality of this vulnerability is reduced as it requires interaction by a user with the Veeam ONE Administrator role.
References
Link Resource
https://www.veeam.com/kb4508 Patch Vendor Advisory
https://www.veeam.com/kb4508 Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:veeam:one:11.0.0.1379:*:*:*:*:*:*:*
cpe:2.3:a:veeam:one:11.0.1.1880:*:*:*:*:*:*:*
cpe:2.3:a:veeam:one:12.0.0.2498:*:*:*:*:*:*:*
cpe:2.3:a:veeam:one:12.0.1.2591:*:*:*:*:*:*:*

History

21 Nov 2024, 08:13

Type Values Removed Values Added
References () https://www.veeam.com/kb4508 - Patch, Vendor Advisory () https://www.veeam.com/kb4508 - Patch, Vendor Advisory

14 Nov 2023, 20:22

Type Values Removed Values Added
First Time Veeam one
Veeam
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
References () https://www.veeam.com/kb4508 - () https://www.veeam.com/kb4508 - Patch, Vendor Advisory
CPE cpe:2.3:a:veeam:one:11.0.0.1379:*:*:*:*:*:*:*
cpe:2.3:a:veeam:one:11.0.1.1880:*:*:*:*:*:*:*
cpe:2.3:a:veeam:one:12.0.1.2591:*:*:*:*:*:*:*
cpe:2.3:a:veeam:one:12.0.0.2498:*:*:*:*:*:*:*
CWE CWE-79

07 Nov 2023, 12:14

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-07 07:15

Updated : 2024-11-21 08:13


NVD link : CVE-2023-38549

Mitre link : CVE-2023-38549

CVE.ORG link : CVE-2023-38549


JSON object : View

Products Affected

veeam

  • one
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')