icon

Digital safety starts here for both commercial and personal Use...

Defend Your Business Against the Latest WNY Cyber Threats We offer Safe, Secure and Affordable Solutions for your Business and Personal Networks and Devices.



WNYCyber is there to help you to choose the best service providers in Western New York... We DO NOT provide the services ourselves, as we are Internet Programmers who have to deak daily with Cyber Threats... (Ugghhh)... So we know what it's like and what it takes to protect OUR and OUR CUSTOMERS DATA... We built this Website to help steer you to those that can give you the best service at realistic and non-inflated prices. We do charge or collect any fees.

Feds Warn of Rise in Attacks Involving Veeam Software Flaw

Cyber Security Threat Summary:
Federal authorities have issued a warning about an increase in cyberattacks targeting Veeam's backup application in the healthcare sector. The attacks exploit a high-severity vulnerability (CVE-2023-27532) in Veeam Backup & Replication, potentially leading to unauthorized access, data theft, or ransomware deployment. The vulnerability affects all versions of the software and poses a significant threat to healthcare environments that rely on Veeam for protecting and restoring files and applications. The attacks have been linked to the cybercrime group FIN7, known for affiliations with ransomware groups. Veeam has released a patch for the vulnerability, urging customers to update their software promptly.

CVE-2023-27532 - “Vulnerability in Veeam Backup & Replication component allows encrypted credentials stored in the configuration database to be obtained. This may lead to gaining access to the backup infrastructure hosts, Base Score: 7.5 HIGH.”

https://nvd.nist.gov/vuln/detail/cve-2023-27532

Security Officer Comments:
Security researchers highlight the seriousness of the vulnerability, noting that it allows for remote code execution and leakage of plaintext credentials with local system privileges. They argue that the CVSS score of 7.5 underestimates the impact and suggest a more appropriate score of 9.1. The flaw has been leveraged in ransomware attacks and data exfiltration campaigns in the past.

Suggested Correction(s):
Veeam recommends that customers install the latest versions of their software and promptly apply the provided patch. Additionally, organizations should follow Veeam's recommended mitigations, which may include blocking external connections to port TCP 9401 in the backup server firewall as a temporary measure.

Source: https://www.bankinfosecurity.com/feds-warn-rise-in-attacks-involving-veeam-software-flaw-a-22050
https://nvd.nist.gov/vuln/detail/cve-2023-27532