CVE-2024-22021: Vulnerability in Veeam Recovery Orchestrator
Vulnerability CVE-2024-22021 allows a Veeam Recovery Orchestrator user with a low privileged role (Plan Author) to retrieve plans from a Scope other than the one they are assigned to.
AI Analysis
Technical Summary
CVE-2024-22021 is a security vulnerability identified in Veeam Recovery Orchestrator version 6. This product is designed to automate and orchestrate disaster recovery plans, enabling organizations to manage recovery workflows efficiently. The vulnerability allows a user assigned a low-privileged role, specifically the 'Plan Author' role, to access recovery plans that belong to a different Scope than the one they are authorized for. In Veeam Recovery Orchestrator, Scopes are used to segregate access and control over different sets of recovery plans, ensuring that users can only view and manage plans within their assigned boundaries. The flaw corresponds to CWE-285, which relates to improper authorization. The CVSS 3.0 score for this vulnerability is 6.5 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and no availability impact (A:N). This means an attacker with legitimate low-level access can remotely exploit this vulnerability without additional user interaction to gain unauthorized read access to sensitive recovery plans outside their assigned scope. Although no known exploits are currently reported in the wild, the vulnerability poses a risk of information disclosure, potentially exposing sensitive disaster recovery configurations and strategies that could be leveraged for further attacks or reconnaissance. Since the vulnerability does not affect integrity or availability, the main concern is unauthorized confidentiality breach of recovery plans.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive disaster recovery plans, which often contain critical information about infrastructure, backup strategies, and recovery procedures. Exposure of such information could aid threat actors in planning targeted attacks, including ransomware or sabotage, by understanding recovery capabilities and weaknesses. Organizations in sectors with stringent data protection regulations, such as finance, healthcare, and critical infrastructure, could face compliance risks if sensitive information is leaked. Additionally, unauthorized access to recovery plans could undermine trust in the organization's ability to secure its disaster recovery processes. While the vulnerability does not allow modification or disruption of recovery plans, the confidentiality breach alone can have significant operational and reputational consequences.
Mitigation Recommendations
To mitigate this vulnerability, organizations should: 1) Apply any patches or updates provided by Veeam as soon as they become available, even though no patch links are currently listed, monitoring official Veeam advisories is critical. 2) Review and tighten role-based access controls within Veeam Recovery Orchestrator, ensuring that users are assigned the minimum necessary privileges and that Plan Author roles are strictly limited to appropriate scopes. 3) Implement network segmentation and access restrictions to limit exposure of the Recovery Orchestrator interface to trusted networks and users only. 4) Conduct regular audits of user access and recovery plan visibility to detect any unauthorized access attempts or anomalies. 5) Employ monitoring and alerting on access to recovery plans, especially for users with low privileges, to quickly identify potential exploitation attempts. 6) Educate administrators and users about the sensitivity of recovery plans and the importance of adhering to access policies. These steps go beyond generic advice by focusing on access control hygiene, proactive monitoring, and network-level protections tailored to the specific nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2024-22021: Vulnerability in Veeam Recovery Orchestrator
Description
Vulnerability CVE-2024-22021 allows a Veeam Recovery Orchestrator user with a low privileged role (Plan Author) to retrieve plans from a Scope other than the one they are assigned to.
AI-Powered Analysis
Technical Analysis
CVE-2024-22021 is a security vulnerability identified in Veeam Recovery Orchestrator version 6. This product is designed to automate and orchestrate disaster recovery plans, enabling organizations to manage recovery workflows efficiently. The vulnerability allows a user assigned a low-privileged role, specifically the 'Plan Author' role, to access recovery plans that belong to a different Scope than the one they are authorized for. In Veeam Recovery Orchestrator, Scopes are used to segregate access and control over different sets of recovery plans, ensuring that users can only view and manage plans within their assigned boundaries. The flaw corresponds to CWE-285, which relates to improper authorization. The CVSS 3.0 score for this vulnerability is 6.5 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and no availability impact (A:N). This means an attacker with legitimate low-level access can remotely exploit this vulnerability without additional user interaction to gain unauthorized read access to sensitive recovery plans outside their assigned scope. Although no known exploits are currently reported in the wild, the vulnerability poses a risk of information disclosure, potentially exposing sensitive disaster recovery configurations and strategies that could be leveraged for further attacks or reconnaissance. Since the vulnerability does not affect integrity or availability, the main concern is unauthorized confidentiality breach of recovery plans.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive disaster recovery plans, which often contain critical information about infrastructure, backup strategies, and recovery procedures. Exposure of such information could aid threat actors in planning targeted attacks, including ransomware or sabotage, by understanding recovery capabilities and weaknesses. Organizations in sectors with stringent data protection regulations, such as finance, healthcare, and critical infrastructure, could face compliance risks if sensitive information is leaked. Additionally, unauthorized access to recovery plans could undermine trust in the organization's ability to secure its disaster recovery processes. While the vulnerability does not allow modification or disruption of recovery plans, the confidentiality breach alone can have significant operational and reputational consequences.
Mitigation Recommendations
To mitigate this vulnerability, organizations should: 1) Apply any patches or updates provided by Veeam as soon as they become available, even though no patch links are currently listed, monitoring official Veeam advisories is critical. 2) Review and tighten role-based access controls within Veeam Recovery Orchestrator, ensuring that users are assigned the minimum necessary privileges and that Plan Author roles are strictly limited to appropriate scopes. 3) Implement network segmentation and access restrictions to limit exposure of the Recovery Orchestrator interface to trusted networks and users only. 4) Conduct regular audits of user access and recovery plan visibility to detect any unauthorized access attempts or anomalies. 5) Employ monitoring and alerting on access to recovery plans, especially for users with low privileges, to quickly identify potential exploitation attempts. 6) Educate administrators and users about the sensitivity of recovery plans and the importance of adhering to access policies. These steps go beyond generic advice by focusing on access control hygiene, proactive monitoring, and network-level protections tailored to the specific nature of this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- hackerone
- Date Reserved
- 2024-01-04T01:04:06.574Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 6841c5b1182aa0cae2e68cd5
Added to database: 6/5/2025, 4:28:33 PM
Last enriched: 7/7/2025, 3:57:21 PM
Last updated: 7/28/2025, 7:00:20 AM
Views: 12
Related Threats
CVE-2025-8951: SQL Injection in PHPGurukul Teachers Record Management System
MediumCVE-2025-8950: SQL Injection in Campcodes Online Recruitment Management System
MediumCVE-2025-27388: CWE-20 Improper Input Validation in OPPO OPPO HEALTH APP
HighCVE-2025-8949: Stack-based Buffer Overflow in D-Link DIR-825
HighCVE-2025-8948: SQL Injection in projectworlds Visitor Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.