[Security Vulnerability Alert] Veeam backup software contains multiple critical cybersecurity vulnerabilities.

 
2026/3/17 ~ 2026/9/17
View Count:34

Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Warning TWCERTCC-200-202603-00000015

[Content Description]
Veeam Backup and Replication is the core backup software of Veeam. Veeam recently released a major cybersecurity vulnerability announcement.

【CVE-2026-21666, CVSS: 9.9】Allows an authenticated domain user to remotely execute code on the backup server.

【CVE-2026-21667, CVSS: 9.9】Allows an authenticated domain user to remotely execute code on the backup server.

【CVE-2026-21668, CVSS: 8.8】Allows an authenticated domain user to bypass restrictions and manipulate arbitrary files in the backup repository.

【CVE-2026-21672, CVSS: 8.8】A native privilege escalation vulnerability exists in the Windows-based Veeam Backup and Replication server.

【CVE-2026-21708, CVSS: 9.9】Allows a backup viewer to remotely execute code as a user.

【CVE-2026-21669, CVSS: 9.9】Allows an authenticated domain user to remotely execute code on the backup server.

【CVE-2026-21671, CVSS: 9.1】Allows an authenticated user with the backup administrator role to remotely execute code in a Veeam Backup and Replication high availability (HA) deployment.

[Affected Platforms]
Veeam Backup and Replication versions 12.3.2.4165 and earlier
Veeam Backup and Replication versions 13.0.1.1071 and earlier

[Recommended Actions]
Please update to the following versions: Veeam Backup and Replication 12.3.2.4465, Veeam Backup and Replication 13.0.1.2067

[References]
1. https://www.twcert.org.tw/tw/cp-169-10783-d40f5-1.html

Files
system_update_alt參考資料
Top↑