Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-37505 | An authentication bypass vulnerability can allow a low privileged attacker to access the NTLM hash of service account on the VSPC server. |
| Link | Providers |
|---|---|
| https://www.veeam.com/kb4649 |
|
Mon, 09 Sep 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Veeam
Veeam service Provider Console |
|
| Weaknesses | CWE-200 | |
| CPEs | cpe:2.3:a:veeam:service_provider_console:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Veeam
Veeam service Provider Console |
|
| Metrics |
ssvc
|
Sat, 07 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authentication bypass vulnerability can allow a low privileged attacker to access the NTLM hash of service account on the VSPC server. | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-09-09T13:29:12.838Z
Reserved: 2024-06-19T01:04:07.137Z
Link: CVE-2024-38650
Updated: 2024-09-09T13:25:45.309Z
Status : Deferred
Published: 2024-09-07T17:15:12.183
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-38650
No data.
OpenCVE Enrichment
No data.
EUVD