Vulnerabilities
Vulnerable Software
A vulnerability in the Mount service of Veeam Backup & Replication, which allows for remote code execution (RCE) on the Backup infrastructure hosts by an authenticated domain user.
CVSS Score
9.9
EPSS Score
0.002
Published
2025-10-31
A vulnerability allowing remote code execution (RCE) on the Backup Server by an authenticated domain user.
CVSS Score
8.8
EPSS Score
0.003
Published
2025-10-31
A vulnerability allowing an authenticated user with the Backup Operator role to modify backup jobs, which could execute arbitrary code.
CVSS Score
7.2
EPSS Score
0.001
Published
2025-06-19
A vulnerability allowing remote code execution (RCE) on the Backup Server by an authenticated domain user
CVSS Score
9.9
EPSS Score
0.003
Published
2025-06-19
A vulnerability allowing remote code execution (RCE) for domain users.
CVSS Score
9.9
EPSS Score
0.014
Published
2025-03-20
A vulnerability in Veeam Backup & Replication platform allows a low-privileged user with a specific role to exploit a method that updates critical configuration settings, such as modifying the trusted client certificate used for authentication on a specific port. This can result in unauthorized access, enabling the user to call privileged methods and initiate critical services. The issue arises due to insufficient permission requirements on the method, allowing users with low privileges to perform actions that should require higher-level permissions.
CVSS Score
8.8
EPSS Score
0.001
Published
2024-12-04
A vulnerability in Veeam Backup & Replication allows users with certain operator roles to expose saved credentials by leveraging a combination of methods in a remote management interface. This can be achieved using a session object that allows for credential enumeration and exploitation, leading to the leak of plaintext credentials to a malicious host. The attack is facilitated by improper usage of a method that allows operators to add a new host with an attacker-controlled IP, enabling them to retrieve sensitive credentials in plaintext.
CVSS Score
7.7
EPSS Score
0.001
Published
2024-12-04
A vulnerability exists where a low-privileged user can exploit insufficient permissions in credential handling to leak NTLM hashes of saved credentials. The exploitation involves using retrieved credentials to expose sensitive NTLM hashes, impacting systems beyond the initial target and potentially leading to broader security vulnerabilities.
CVSS Score
7.7
EPSS Score
0.001
Published
2024-12-04
A vulnerability in Veeam Backup & Replication allows a low-privileged user with certain roles to perform remote code execution (RCE) by updating existing jobs. These jobs can be configured to run pre- and post-scripts, which can be located on a network share and are executed with elevated privileges by default. The user can update a job and schedule it to run almost immediately, allowing arbitrary code execution on the server.
CVSS Score
8.8
EPSS Score
0.005
Published
2024-12-04
A vulnerability in Veeam Backup & Replication allows low-privileged users to leak all saved credentials in plaintext. This is achieved by calling a series of methods over an external protocol, ultimately retrieving the credentials using a malicious setup on the attacker's side. This exposes sensitive data, which could be used for further attacks, including unauthorized access to systems managed by the platform.
CVSS Score
7.7
EPSS Score
0.001
Published
2024-12-04


Contact Us

Shodan ® - All rights reserved