Critical Veeam Backup RCE Vulnerabilities Let Attackers Execute Malicious Code Remotely

Critical Veeam Backup RCE Vulnerabilities Let Attackers Execute Malicious Code Remotely

Veeam Software has disclosed three serious security flaws in its Backup & Replication suite and Agent for Microsoft Windows, which enable remote code execution and privilege escalation, potentially compromising enterprise backup infrastructures.

These vulnerabilities, patched in recent updates, primarily affect domain-joined systems in version 12 of the software. Organizations are urged to apply fixes immediately to prevent potential data breaches or ransomware exploitation.

CVE ID Description Severity CVSS v3.1 Score Affected Versions Patched Version
CVE-2025-48983 Veeam Backup & Replication 12.3.2.3617 and all earlier versions 12 builds Critical 9.9 Veeam Backup & Replication 12.3.2.3617 and all earlier version of 12 builds 12.3.2.4165 Patch
CVE-2025-48984 Vulnerability allowing RCE on the Backup Server by an authenticated domain user Critical 9.9 Veeam Agent for Microsoft Windows 6.3.2.1205 and all earlier versions 6 builds 12.3.2.4165 Patch
CVE-2025-48982 Local Privilege Escalation in Veeam Agent for Microsoft Windows if an administrator is tricked into restoring malicious file High 7.3 Local Privilege Escalation in Veeam Agent for Microsoft Windows if administrator is tricked into restoring malicious file 6.3.2.1302

Mount Service RCE Threatens Backup Hosts

The first critical issue, CVE-2025-48983, resides in the Mount service of Veeam Backup & Replication, allowing an authenticated domain user to execute arbitrary code on backup infrastructure hosts.

With a CVSS v3.1 score of 9.9, this flaw was reported by CODE WHITE and impacts all version 12 builds up to 12.3.2.3617, including unsupported older releases, which are likely vulnerable.

Veeam notes that only domain-joined configurations are at risk, while the Veeam Software Appliance and forthcoming version 13 remain architecturally unaffected.

The patch, build 12.3.2.4165, resolves the issue by hardening the service against unauthorized code injection. Administrators are advised to follow Veeam’s best practices, favoring workgroup setups over domain integration for enhanced security.

google

Backup Server Exposed To Domain User Attacks

Similarly severe is CVE-2025-48984, another RCE vulnerability targeting the Backup Server itself, exploitable by authenticated domain users with a perfect 9.9 CVSS score.

Discovered by Sina Kheirkhah and Piotr Bazydlo of watchTowr, it shares the same affected versions as CVE-2025-48983, limited to domain-joined Veeam Backup & Replication v12 environments.

Unsupported versions should be treated as vulnerable, though not explicitly tested. The same patch, 12.3.2.4165, eliminates this risk, emphasizing the need for swift updates in hybrid or Active Directory-integrated setups.

This flaw underscores the dangers of over-privileged domain access in backup systems, potentially enabling lateral movement across networks.

Agent’s Restore Flaw Enables Privilege Escalation

Complementing the RCE issues, CVE-2025-48982 affects Veeam Agent for Microsoft Windows, permitting local privilege escalation if an administrator restores a malicious file, rated high severity at 7.3 CVSS.

Reported anonymously via Trend Micro’s Zero Day Initiative, it hits versions up to 6.3.2.1205, integrated with Backup & Replication or standalone.

Exploitation requires tricking a user into restoration, but could elevate attacker privileges significantly. Fixed in build 6.3.2.1302, this patch is crucial for endpoint protection in Windows environments.

Veeam recommends verifying all agent instances and isolating backups to mitigate social engineering risks. Organizations using affected versions should prioritize updates to safeguard against code execution threats.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.