Critical Veeam Backup Vulnerability Let Attackers Execute Arbitrary Code to Gain Root Access


A critical vulnerability, identified as CVE-2025-23114, has been discovered in the Veeam Updater component, a key element of multiple Veeam backup solutions. 

This flaw enables attackers to execute arbitrary code on affected servers through a Man-in-the-Middle (MitM) attack, potentially granting root-level permissions. 

The vulnerability has been assigned a severity score of 9.0, underscoring its significant risk.

SIEM as a Service

Overview of the Veeam Backup Vulnerability 

The vulnerability exists due to insecure communication channels used by the Veeam Updater component when transmitting sensitive data. 

Exploiting this flaw allows attackers positioned between the vulnerable appliance and its update server to intercept and interfere with update requests. 

By injecting malicious code, attackers can gain complete control over the system, leading to potential data breaches, ransomware deployment, or persistent access within an organization’s infrastructure.

This issue impacts various Veeam products, including:

  • Veeam Backup for Salesforce (versions 3.1 and older)
  • Veeam Backup for Nutanix AHV (versions 5.0 and 5.1)
  • Veeam Backup for AWS (versions 6a and 7)
  • Veeam Backup for Microsoft Azure (versions 5a and 6)
  • Veeam Backup for Google Cloud (versions 4 and 5)
  • Veeam Backup for Oracle Linux Virtualization Manager and Red Hat Virtualization (versions 3, 4.0, and 4.1)

Veeam has released updates addressing CVE-2025-23114 by patching the affected Veeam Updater component in newer versions of its software. 

Automatic updates are enabled by default for all actively supported backup appliances, ensuring that most users will receive the fix without manual intervention.

The following updated versions of the Veeam Updater component resolve the vulnerability:

Product  Fixed Updater Version
Veeam Backup for Salesforce 7.9.0.1124
Veeam Backup for Nutanix AHV 9.0.0.1125
Veeam Backup for AWS 9.0.0.1126
Veeam Backup for Microsoft Azure 9.0.0.1128
Veeam Backup for Google Cloud 9.0.0.1128
Veeam Backup for Oracle Linux Virtualization Manager and Red Hat Virtualization 9.0.0.1127

Organizations using older versions of affected products are at heightened risk if updates are not promptly applied. However, deployments running Veeam Backup & Replication version 12.3 with updated appliances are unaffected.

Mitigation Steps

To protect against this critical vulnerability:

  • Use the built-in Veeam Updater tool to ensure your appliance is running the fixed version.
  • Check the version of your Veeam Updater component by navigating to the update history or reviewing logs in /veeam/veeam-updater/updater.log.
  • Ensure that all backup appliances are updated to the latest unaffected versions

This highlights the importance of maintaining up-to-date software in critical infrastructure systems like backup solutions. 

Administrators should ensure their systems are patched promptly while implementing additional security measures such as network monitoring and isolating backup appliances from external access wherever possible.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free



Source link