CVE-2022-26501
📋 TL;DR
CVE-2022-26501 is an incorrect access control vulnerability in Veeam Backup & Replication that allows unauthenticated attackers to execute arbitrary code with SYSTEM privileges. This affects Veeam Backup & Replication 10.x and 11.x installations. The vulnerability is remotely exploitable without authentication.
💻 Affected Systems
- Veeam Backup & Replication
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with SYSTEM privileges, enabling attackers to steal backup data, deploy ransomware, or pivot to other systems in the network.
Likely Case
Remote code execution leading to backup data theft, credential harvesting, and deployment of malware/ransomware.
If Mitigated
Limited impact if network segmentation isolates backup servers and strict access controls are implemented.
🎯 Exploit Status
CISA has added this to its Known Exploited Vulnerabilities catalog. Multiple threat actors have been observed exploiting this vulnerability in the wild.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Veeam Backup & Replication 11a (11.0.1.1261) and later
Vendor Advisory: https://www.veeam.com/kb4288
Restart Required: Yes
Instructions:
1. Download the cumulative patch from Veeam KB4288. 2. Apply the patch to all Veeam Backup & Replication servers. 3. Restart the Veeam services or reboot the server as required.
🔧 Temporary Workarounds
Block Veeam Distribution Service Ports
windowsBlock inbound network access to Veeam Distribution Service ports (TCP 9380 by default) at the firewall.
netsh advfirewall firewall add rule name="Block Veeam Distribution Service" dir=in action=block protocol=TCP localport=9380
Disable Veeam Distribution Service
windowsTemporarily disable the vulnerable service until patching can be completed.
sc stop VeeamDistributionSvc
sc config VeeamDistributionSvc start= disabled
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Veeam servers from untrusted networks
- Apply principle of least privilege and monitor for suspicious activity on Veeam servers
🔍 How to Verify
Check if Vulnerable:
Check Veeam Backup & Replication version. If version is 10.x or 11.x (before 11.0.1.1261), the system is vulnerable.
Check Version:
Open Veeam Backup & Replication console, go to Help > About, or check installed programs in Windows Control Panel.
Verify Fix Applied:
Verify version is 11.0.1.1261 or later, and check that Veeam Distribution Service is running with the updated binaries.
📡 Detection & Monitoring
Log Indicators:
- Unusual connections to Veeam Distribution Service port 9380
- Suspicious process creation from VeeamDistributionSvc.exe
- Failed authentication attempts followed by successful exploitation
Network Indicators:
- Unexpected outbound connections from Veeam servers
- Traffic to known malicious IPs from backup infrastructure
- Anomalous network traffic patterns on port 9380
SIEM Query:
source="veeam.logs" AND (event_id="1000" OR process_name="VeeamDistributionSvc.exe") AND (destination_port="9380" OR command_line CONTAINS "powershell" OR command_line CONTAINS "cmd")