Overview
- Description
- A vulnerability in Veeam ONE allows an unprivileged user who has access to the Veeam ONE Web Client the ability to acquire the NTLM hash of the account used by the Veeam ONE Reporting Service. Note: The criticality of this vulnerability is reduced as it requires interaction by a user with the Veeam ONE Administrator role.
- Source
- support@hackerone.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.4
- Impact score
- 2.7
- Exploitability score
- 2.3
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
CVSS 3.0
- Type
- Secondary
- Base score
- 4.5
- Impact score
- 3.6
- Exploitability score
- 0.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
Weaknesses
- nvd@nist.gov
- CWE-79
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:veeam:one:11.0.0.1379:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8D1ECDF8-4BAB-4E77-A409-EB5065AB916D" }, { "criteria": "cpe:2.3:a:veeam:one:11.0.1.1880:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD967DF5-1470-43EF-9465-A2E464F30F88" }, { "criteria": "cpe:2.3:a:veeam:one:12.0.0.2498:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D1C9B702-1613-4570-B9CB-5BF3F7F6B732" }, { "criteria": "cpe:2.3:a:veeam:one:12.0.1.2591:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1FB1ABE-0179-400B-8EFD-7F84A51B64C8" } ], "operator": "OR" } ] } ]