Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-39396 | A vulnerability that allows an attacker to access the NTLM hash of the Veeam Reporter Service service account. This attack requires user interaction and data collected from Veeam Backup & Replication. |
| Link | Providers |
|---|---|
| https://www.veeam.com/kb4649 |
|
Thu, 01 May 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 09 Sep 2024 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Veeam
Veeam one |
|
| Weaknesses | CWE-200 | |
| CPEs | cpe:2.3:a:veeam:one:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Veeam
Veeam one |
|
| Metrics |
ssvc
|
Sat, 07 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability that allows an attacker to access the NTLM hash of the Veeam Reporter Service service account. This attack requires user interaction and data collected from Veeam Backup & Replication. | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-09-09T16:41:08.546Z
Reserved: 2024-07-27T01:04:08.012Z
Link: CVE-2024-42019
Updated: 2024-09-09T16:40:55.210Z
Status : Analyzed
Published: 2024-09-07T17:15:13.980
Modified: 2025-05-01T18:19:46.747
Link: CVE-2024-42019
No data.
OpenCVE Enrichment
No data.
EUVD