Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-22901: n/a

0
Critical
VulnerabilityCVE-2024-22901cvecve-2024-22901
Published: Fri Feb 02 2024 (02/02/2024, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Vinchin Backup & Recovery v7.2 was discovered to use default MYSQL credentials.

AI-Powered Analysis

AILast updated: 11/05/2025, 00:00:06 UTC

Technical Analysis

CVE-2024-22901 identifies a critical security vulnerability in Vinchin Backup & Recovery version 7.2, where the software uses default MySQL credentials for its database backend. This misconfiguration allows unauthenticated remote attackers to connect to the MySQL database without any privileges or user interaction, granting them full control over the backup data stored within. The vulnerability has been assigned a CVSS 3.1 base score of 9.8, reflecting its critical severity with attack vector as network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploiting this flaw could enable attackers to exfiltrate sensitive backup data, modify or delete backups, or disrupt backup and recovery operations, potentially causing severe data loss or operational downtime. Although no known exploits have been reported in the wild yet, the default credential issue is a well-known and easily exploitable security weakness. The vulnerability was published on February 2, 2024, and is enriched by CISA, indicating its recognized importance. The lack of vendor patches at the time of disclosure increases the urgency for organizations to implement interim mitigations such as changing default credentials and restricting database access. Given that backup systems are critical components of IT infrastructure, this vulnerability poses a significant risk to data security and business continuity.

Potential Impact

For European organizations, the exploitation of CVE-2024-22901 could lead to catastrophic consequences. Unauthorized access to backup databases can result in the theft of sensitive corporate and customer data, violating GDPR and other data protection regulations, leading to legal and financial penalties. Attackers could also tamper with or delete backup data, undermining disaster recovery capabilities and causing prolonged downtime or data loss. Critical sectors such as finance, healthcare, manufacturing, and government services that rely heavily on backup and recovery solutions would face operational disruptions and reputational damage. The ease of exploitation without authentication or user interaction increases the likelihood of attacks, especially in environments where network segmentation and access controls are weak. Additionally, the potential for ransomware actors to leverage this vulnerability to encrypt or destroy backups could amplify the impact. Overall, this vulnerability threatens confidentiality, integrity, and availability of essential backup data across European enterprises.

Mitigation Recommendations

To mitigate CVE-2024-22901, organizations should immediately change any default MySQL credentials used by Vinchin Backup & Recovery to strong, unique passwords. Network-level access controls should be implemented to restrict MySQL database access only to trusted hosts and management systems, ideally through firewall rules or VPNs. Monitoring and logging database access attempts should be enabled to detect suspicious activity early. Organizations should also verify that the backup software is updated to the latest version once the vendor releases a patch addressing this vulnerability. If patching is not immediately possible, consider isolating the backup server from untrusted networks and disabling remote database access where feasible. Conducting a thorough audit of backup configurations and credentials across the environment will help identify other potential misconfigurations. Finally, organizations should review and test their incident response and disaster recovery plans to prepare for potential exploitation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-11T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec2e1

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 11/5/2025, 12:00:06 AM

Last updated: 12/4/2025, 2:49:44 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats