PSA: If you use #Veeam Backup & Replication (very common), upgrade. Especially if you face server to internet.

Screenshot from Code White, the API lets you remotely request Windows admin credentials for some reason, no auth request.

In their advisory Veeam claimed these are encrypted... it's base64 (lololol)

#CVE202327532 https://www.veeam.com/kb4424

KB4424: CVE-2023-27532

Vulnerability CVE-2023-27532 in a Veeam Backup & Replication component allows an unauthenticated user operating within the backup infrastructure network perimeter to obtain encrypted credentials stored in the configuration database. This may lead to an attacker gaining access to the backup infrastructure hosts.

Veeam Software
Hackers target vulnerable Veeam backup servers exposed online

Veeam backup servers are being targeted by at least one group of threat actors known to work with multiple high-profile ransomware gangs.

BleepingComputer
@GossiTheDog base64: not even memecrypto
@GossiTheDog why for god's sake would you have your backup infrastructure exposed on the internet!?
@en3py @GossiTheDog I am asking myself the same question with vcenter server facing to the internet site. I think it has something todo with remote management for the admin or/and IT service provider.
@Scheune @GossiTheDog yeah as well as "I am too lazy to figure out the risks... Oh anyway it's in the cloud, so it's secure, right?"
Nope. It's not.
@GossiTheDog Oh FFS can we get a rule that they can't say "encrypted" data if there was no key involved?
@GossiTheDog A further PSA: do not expose your backup infra directly to the Internet!
@GossiTheDog base64 all your admins belong to us. OMFreakingGosh.
@GossiTheDog Well, to quote @mwulftange: "passwords are stored encrypted using DataProtectionScope.LocalMachine. But they get decrypted during serialization of the CCredentials object before transit. So, yes, the client receives the passwords in plaintext"
@GossiTheDog I don’t understand why anyone would expose their backup system to the Internet.

@deepthoughts10 @GossiTheDog I think #attackSurface reduction is not well understood by many non #security folks as well as security folks.

You don’t have to fix so often what is not exposed
Try to be lazy and don’t expose it right from the start

@GossiTheDog I used Base64 encoded output just to make sure special characters such as the umlaut in Süp3rS3cr3tP4$$w0rd! don't get mangled or lost when printing to console.

@GossiTheDog

Someone else who doesn't know the difference between encryption and encoding 🫤🤦‍♂️

@GossiTheDog Have you told James? 🤔