HomeVeeamCVE-2024-45207

CVE-2024-45207

HIGH
7.0CVSS
Published: 2024-12-04
Updated: 2025-07-02
AI Analysis

Description

DLL injection in Veeam Agent for Windows can occur if the system's PATH variable includes insecure locations. When the agent runs, it searches these directories for necessary DLLs. If an attacker places a malicious DLL in one of these directories, the Veeam Agent might load it inadvertently, allowing the attacker to execute harmful code. This could lead to unauthorized access, data theft, or disruption of services

CVSS Metrics

Vector
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
local
Complexity
high
Privileges
low
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-426

Metadata

Primary Vendor
VEEAM
Published
12/4/2024
Last Modified
7/2/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

veeam : veeam_agent_for_windows

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief