7
CVE-2024-45207
- EPSS 0.04%
- Veröffentlicht 04.12.2024 02:15:05
- Zuletzt bearbeitet 02.07.2025 20:29:56
- Quelle support@hackerone.com
- CVE-Watchlists
- Unerledigt
DLL injection in Veeam Agent for Windows can occur if the system's PATH variable includes insecure locations. When the agent runs, it searches these directories for necessary DLLs. If an attacker places a malicious DLL in one of these directories, the Veeam Agent might load it inadvertently, allowing the attacker to execute harmful code. This could lead to unauthorized access, data theft, or disruption of services
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Veeam ≫ Veeam Agent For Windows Version >= 6.0.0.959 < 6.3.0.177
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.095 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| support@hackerone.com | 7 | 1 | 5.9 |
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-426 Untrusted Search Path
The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.