Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-38579 | A path traversal vulnerability allows an attacker with a low-privileged account and local access to the system to perform local privilege escalation (LPE). |
| Link | Providers |
|---|---|
| https://www.veeam.com/kb4649 |
|
Thu, 01 May 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Veeam veeam Backup \& Replication
|
|
| CPEs | cpe:2.3:a:veeam:veeam_backup_\&_replication:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Veeam veeam Backup \& Replication
|
|
| Metrics |
cvssV3_1
|
Mon, 09 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Veeam
Veeam backup \& Replication |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:veeam:backup_\&_replication:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Veeam
Veeam backup \& Replication |
|
| Metrics |
ssvc
|
Sat, 07 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A path traversal vulnerability allows an attacker with a low-privileged account and local access to the system to perform local privilege escalation (LPE). | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-09-09T15:18:23.506Z
Reserved: 2024-07-09T01:04:07.425Z
Link: CVE-2024-40712
Updated: 2024-09-09T15:17:29.105Z
Status : Analyzed
Published: 2024-09-07T17:15:13.410
Modified: 2025-05-01T18:17:14.087
Link: CVE-2024-40712
No data.
OpenCVE Enrichment
No data.
EUVD