Critical RCE Vulnerability: 9.9 CVSS Rating in Backup & Replication

Published:

spot_img

Jun 18, 2025Ravie Lakshmanan
Vulnerability / Data Protection

## Veeam Issues Critical Security Patches

Veeam, a well-known provider of backup and recovery solutions, has recently released important updates to address a severe security vulnerability in its Backup & Replication software. This flaw could allow attackers to execute code remotely under specific circumstances, posing a significant risk to users.

### Understanding the Vulnerability

The security issue, identified as CVE-2025-23121, has received a CVSS score of 9.9, which is quite alarming given that this scale goes up to 10. According to Veeam’s advisory, the vulnerability enables remote code execution (RCE) on the Backup Server by anyone who has authenticated domain user access. This makes it essential for users of earlier version 12 builds, including the notable 12.3.1.1139, to take prompt action.

幸运的是,Veeam has remedied this security gap in the latest release, version 12.3.2 (build 12.3.2.3617). The vulnerability was discovered and reported by security experts at CODE WHITE GmbH and watchTowr, highlighting the critical role of cybersecurity research in safeguarding software systems.

### Additional Security Concerns

Alongside CVE-2025-23121, Veeam has addressed another security vulnerability, CVE-2025-24286, which carries a CVSS score of 7.2. This flaw allows an authenticated user with Backup Operator privileges to potentially modify backup jobs. Such modifications could lead to arbitrary code execution, raising serious concerns about data integrity and security.

In a separate update, Veeam also patched a vulnerability affecting Veeam Agent for Microsoft Windows, labeled CVE-2025-24287. This issue, evaluated with a CVSS score of 6.1, enabled local system users to alter directory contents, which could lead to elevated permissions and potential code execution. Users are encouraged to update to version 6.3.2 (build 6.3.2.1205) to mitigate this risk.

### Frequent Targets for Attackers

According to cybersecurity analytics firm Rapid7, vulnerabilities in Veeam software have increasingly become targets for cybercriminals. In fact, over 20% of incident response cases documented in 2024 involved access or exploitation of Veeam, often occurring after a threat actor had already gained a foothold in the environment.

This trend highlights the urgency for organizations to stay up-to-date with software updates and security patches. As attackers become more sophisticated and find new ways to exploit existing vulnerabilities, it’s crucial for Veeam users to recognize how imperative it is to keep their systems secure.

### The Call to Action

Given the profound risks associated with these vulnerabilities, users must promptly update to the latest versions of Veeam software. Failing to do so may leave systems exposed to potential attacks, especially in an era where cybersecurity threats continue to evolve and grow in complexity.

It’s essential for IT professionals to regularly monitor their software for updates and stay informed about the latest developments in cybersecurity. Proactive measures can significantly reduce the risk of data breaches and help maintain a secure backup environment.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.
spot_img

Related articles

Recent articles

Top 10 Weekly Highlights: Dubai Schools, UAE Holidays, Saudi-Qatar Rail Link, and Real Estate Growth

Latest Developments in the Gulf Region: Key Stories of the Week The growth of the housing market, along with groundbreaking mega-projects and significant advancements in...

New Android Malware Locks Screens and Demands Ransom

A recently identified Android malware, referred to as “DroidLock,” has gained attention for its malicious capabilities, which include locking device...

Last Chance for AT&T Customers: Claim Your Share of $7,500 from $177 Million Settlement!

Deadline Approaches for AT&T Data Settlement Claims Just one week remains for eligible Americans to file claims for a substantial $177 million settlement stemming from...

Do Kwon Sentenced to 15 Years in Prison Following Terraform Labs Collapse

NEW YORK: In a Manhattan courtroom, the fallout from one of cryptocurrency's most significant collapses came to a head. Victims described how their savings...