.. /pveum
Star

Account Enumeration
Permission Enumeration
Persistence
Privilege Escalation
Discovery
Credential Access

pveum (Proxmox VE User Manager) manages users, groups, roles, and permissions in Proxmox VE. Adversaries can use pveum to enumerate accounts, create backdoor users, escalate privileges, and manipulate access controls for persistence.

Paths

Resources

Detection

Acknowledgements

Account Enumeration

  1. List all users configured in Proxmox VE.

    pveum user list
    Use Case Enumerate all user accounts to identify targets for credential attacks.
    Privileges Required Administrator
    Operating System Proxmox VE

    Procedural Examples

    ATT&CK Technique T1087.001

Permission Enumeration

  1. List all access control list entries showing permissions.

    pveum acl list
    Use Case Map permission structure to identify privilege escalation paths.
    Privileges Required Administrator
    Operating System Proxmox VE
    ATT&CK Technique T1069.001

Persistence

  1. Create a new user account.

    pveum user add {userid}@{realm} --password {password}
    Use Case Create backdoor accounts for persistent access.
    Privileges Required Administrator
    Operating System Proxmox VE

    Procedural Examples

    ATT&CK Technique T1136.001
  2. Create an API token for a user.

    pveum user token add {userid}@{realm} {tokenid}
    Use Case Create API tokens for persistent API access without passwords.
    Privileges Required Administrator
    Operating System Proxmox VE

    Procedural Examples

    ATT&CK Technique T1098.001

Privilege Escalation

  1. Grant administrative privileges to a user.

    pveum acl modify / --roles Administrator --users {user}@{realm}
    Use Case Escalate privileges for a controlled account to full administrator.
    Privileges Required Administrator
    Operating System Proxmox VE

    Procedural Examples

    ATT&CK Technique T1098
  2. Create a custom role with specific privileges.

    pveum role add {rolename} --privs {privileges}
    Use Case Create custom roles with specific privileges for stealthy access.
    Privileges Required Administrator
    Operating System Proxmox VE

    Procedural Examples

    ATT&CK Technique T1098

Discovery

  1. List all groups configured in Proxmox VE.

    pveum group list
    Use Case Enumerate groups to understand organizational structure and target high-privilege groups.
    Privileges Required Administrator
    Operating System Proxmox VE
    ATT&CK Technique T1069.001

Credential Access

  1. Read the user configuration file directly.

    cat /etc/pve/user.cfg
    Use Case Extract user configuration including group memberships and role assignments.
    Privileges Required Administrator
    Operating System Proxmox VE
    ATT&CK Technique T1552.001
  2. Read API token configuration file.

    cat /etc/pve/priv/token.cfg
    Use Case Extract API tokens for unauthorized access.
    Privileges Required Administrator
    Operating System Proxmox VE
    ATT&CK Technique T1552.001