CVE-2022-26501

9.8 CRITICAL

📋 TL;DR

CVE-2022-26501 is an incorrect access control vulnerability in Veeam Backup & Replication that allows unauthenticated attackers to execute arbitrary code with SYSTEM privileges. This affects Veeam Backup & Replication 10.x and 11.x installations. The vulnerability is remotely exploitable without authentication.

💻 Affected Systems

Products:
  • Veeam Backup & Replication
Versions: 10.x through 11.x
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability exists in the Veeam Distribution Service.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling attackers to steal backup data, deploy ransomware, or pivot to other systems in the network.

🟠

Likely Case

Remote code execution leading to backup data theft, credential harvesting, and deployment of malware/ransomware.

🟢

If Mitigated

Limited impact if network segmentation isolates backup servers and strict access controls are implemented.

🌐 Internet-Facing: HIGH - Vulnerability is remotely exploitable without authentication and has been actively exploited.
🏢 Internal Only: HIGH - Even internally, this provides SYSTEM-level access to critical backup infrastructure.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CISA has added this to its Known Exploited Vulnerabilities catalog. Multiple threat actors have been observed exploiting this vulnerability in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Veeam Backup & Replication 11a (11.0.1.1261) and later

Vendor Advisory: https://www.veeam.com/kb4288

Restart Required: Yes

Instructions:

1. Download the cumulative patch from Veeam KB4288. 2. Apply the patch to all Veeam Backup & Replication servers. 3. Restart the Veeam services or reboot the server as required.

🔧 Temporary Workarounds

Block Veeam Distribution Service Ports

windows

Block inbound network access to Veeam Distribution Service ports (TCP 9380 by default) at the firewall.

netsh advfirewall firewall add rule name="Block Veeam Distribution Service" dir=in action=block protocol=TCP localport=9380

Disable Veeam Distribution Service

windows

Temporarily disable the vulnerable service until patching can be completed.

sc stop VeeamDistributionSvc
sc config VeeamDistributionSvc start= disabled

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Veeam servers from untrusted networks
  • Apply principle of least privilege and monitor for suspicious activity on Veeam servers

🔍 How to Verify

Check if Vulnerable:

Check Veeam Backup & Replication version. If version is 10.x or 11.x (before 11.0.1.1261), the system is vulnerable.

Check Version:

Open Veeam Backup & Replication console, go to Help > About, or check installed programs in Windows Control Panel.

Verify Fix Applied:

Verify version is 11.0.1.1261 or later, and check that Veeam Distribution Service is running with the updated binaries.

📡 Detection & Monitoring

Log Indicators:

  • Unusual connections to Veeam Distribution Service port 9380
  • Suspicious process creation from VeeamDistributionSvc.exe
  • Failed authentication attempts followed by successful exploitation

Network Indicators:

  • Unexpected outbound connections from Veeam servers
  • Traffic to known malicious IPs from backup infrastructure
  • Anomalous network traffic patterns on port 9380

SIEM Query:

source="veeam.logs" AND (event_id="1000" OR process_name="VeeamDistributionSvc.exe") AND (destination_port="9380" OR command_line CONTAINS "powershell" OR command_line CONTAINS "cmd")

🔗 References

📤 Share & Export