Get a Pentest and security assessment of your IT network.

2021-current

CVE-2020-10914 – This vulnerability allows remote attackers to execute arbitrary code on a

This vulnerability allows remote attackers to execute arbitrary code on affected installations of VEEAM One Agent 9.5.4.4587. Authentication is not required to exploit this vulnerability. The specific flaw exists within the PerformHandshake method. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-10400.

 

Source: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10914

Reference (s):

  • http://packetstormsecurity.com/files/157529/Veeam-ONE-Agent-.NET-Deserialization.html
  • https://www.veeam.com/kb3144
  • https://www.zerodayinitiative.com/advisories/ZDI-20-545/
Related posts
2021-current

CVE-2004-1715 - Directory traversal vulnerability in MIMEsweeper for Web before 5.0.4 all

2021-current

CVE-2014-4742 - Cross-site scripting (XSS) vulnerability in system/class_link.php in the

2021-current

CVE-2014-9837 - coders/pnm.c in ImageMagick 6.9.0-1 Beta and earlier allows remote attack

2021-current

CVE-2020-10446 - The way URIs are handled in admin/header.php in Chadha PHPKB Standard Mul