Categories: Cyber Security News

Critical Veeam Backup RCE Vulnerabilities Let Attackers Execute Malicious Code Remotely

Veeam Software has disclosed three serious security flaws in its Backup & Replication suite and Agent for Microsoft Windows, which enable remote code execution and privilege escalation, potentially compromising enterprise backup infrastructures.

These vulnerabilities, patched in recent updates, primarily affect domain-joined systems in version 12 of the software. Organizations are urged to apply fixes immediately to prevent potential data breaches or ransomware exploitation.

CVE ID Description Severity CVSS v3.1 Score Affected Versions Patched Version
CVE-2025-48983 Veeam Backup & Replication 12.3.2.3617 and all earlier versions 12 builds Critical 9.9 Veeam Backup & Replication 12.3.2.3617 and all earlier version of 12 builds 12.3.2.4165 Patch
CVE-2025-48984 Vulnerability allowing RCE on the Backup Server by an authenticated domain user Critical 9.9 Veeam Agent for Microsoft Windows 6.3.2.1205 and all earlier versions 6 builds 12.3.2.4165 Patch
CVE-2025-48982 Local Privilege Escalation in Veeam Agent for Microsoft Windows if an administrator is tricked into restoring malicious file High 7.3 Local Privilege Escalation in Veeam Agent for Microsoft Windows if administrator is tricked into restoring malicious file 6.3.2.1302

Mount Service RCE Threatens Backup Hosts

The first critical issue, CVE-2025-48983, resides in the Mount service of Veeam Backup & Replication, allowing an authenticated domain user to execute arbitrary code on backup infrastructure hosts.

With a CVSS v3.1 score of 9.9, this flaw was reported by CODE WHITE and impacts all version 12 builds up to 12.3.2.3617, including unsupported older releases, which are likely vulnerable.

Veeam notes that only domain-joined configurations are at risk, while the Veeam Software Appliance and forthcoming version 13 remain architecturally unaffected.

The patch, build 12.3.2.4165, resolves the issue by hardening the service against unauthorized code injection. Administrators are advised to follow Veeam’s best practices, favoring workgroup setups over domain integration for enhanced security.

Backup Server Exposed To Domain User Attacks

Similarly severe is CVE-2025-48984, another RCE vulnerability targeting the Backup Server itself, exploitable by authenticated domain users with a perfect 9.9 CVSS score.

Discovered by Sina Kheirkhah and Piotr Bazydlo of watchTowr, it shares the same affected versions as CVE-2025-48983, limited to domain-joined Veeam Backup & Replication v12 environments.

Unsupported versions should be treated as vulnerable, though not explicitly tested. The same patch, 12.3.2.4165, eliminates this risk, emphasizing the need for swift updates in hybrid or Active Directory-integrated setups.

This flaw underscores the dangers of over-privileged domain access in backup systems, potentially enabling lateral movement across networks.

Agent’s Restore Flaw Enables Privilege Escalation

Complementing the RCE issues, CVE-2025-48982 affects Veeam Agent for Microsoft Windows, permitting local privilege escalation if an administrator restores a malicious file, rated high severity at 7.3 CVSS.

Reported anonymously via Trend Micro’s Zero Day Initiative, it hits versions up to 6.3.2.1205, integrated with Backup & Replication or standalone.

Exploitation requires tricking a user into restoration, but could elevate attacker privileges significantly. Fixed in build 6.3.2.1302, this patch is crucial for endpoint protection in Windows environments.

Veeam recommends verifying all agent instances and isolating backups to mitigate social engineering risks. Organizations using affected versions should prioritize updates to safeguard against code execution threats.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post Critical Veeam Backup RCE Vulnerabilities Let Attackers Execute Malicious Code Remotely appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

New restaurants, tasting room fully open at Cherapa Place

March 16, 2026 All three new food and beverage options at Cherapa Place now are…

11 minutes ago

Multifamily occupancy trends down some with more construction ahead

March 16, 2026 Vacancy in the Sioux Falls multifamily market ticked up to start the…

12 minutes ago

Antisemitism’s Afterlives

Reviewed: On Antisemitism: A Word in HistoryMark MazowerPenguin Press, $29 In April 2024, six months…

16 minutes ago

Onchain infrastructure platform RadiusTech.xyz focuses on high-volume digital transactions

RadiusTech.xyz – Cloudflare customer – (United States)  Forward-looking developers use .xyz domains to build AI…

17 minutes ago

Enchanting Video Shows How Globes Were Made by Hand in 1955: The End of a 500-Year Tradition

The first globe—a spherical representation of our planet Earth—dates back to the Age of Discovery.…

27 minutes ago

New Jersey Adds 15 Towns To Film Ready Communities Program

The New Jersey Motion Picture and Television Commission announced Tuesday that 15 towns joined the…

34 minutes ago

This website uses cookies.