CVE-2025-23120

8.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution (RCE) for domain users in Veeam Backup & Replication. Attackers can execute arbitrary code with domain user privileges, potentially compromising backup infrastructure and sensitive data. Organizations using affected Veeam products are at risk.

💻 Affected Systems

Products:
  • Veeam Backup & Replication
Versions: Versions prior to the patch specified in KB4724
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires domain user access to exploit; affects default installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full domain compromise leading to data exfiltration, ransomware deployment across network, and complete backup system takeover.

🟠

Likely Case

Domain user privilege escalation allowing access to backup data, credential harvesting, and lateral movement within the network.

🟢

If Mitigated

Limited impact with proper network segmentation, least privilege access, and monitoring in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires domain user credentials; technical details are publicly available but no public proof-of-concept exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: As specified in Veeam KB4724

Vendor Advisory: https://www.veeam.com/kb4724

Restart Required: No

Instructions:

1. Download the patch from Veeam KB4724. 2. Apply the patch to all affected Veeam Backup & Replication servers. 3. Verify successful installation.

🔧 Temporary Workarounds

Restrict Domain User Access

all

Limit domain user access to Veeam Backup & Replication servers to only necessary personnel.

Network Segmentation

all

Isolate Veeam Backup & Replication servers from general network access.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Veeam servers
  • Apply principle of least privilege to domain user accounts
  • Enable detailed logging and monitoring for suspicious activities

🔍 How to Verify

Check if Vulnerable:

Check Veeam Backup & Replication version against the patched version in KB4724.

Check Version:

Check Veeam console or installation directory for version information.

Verify Fix Applied:

Verify the patch version is installed and matches the version specified in KB4724.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution from Veeam services
  • Suspicious authentication attempts to Veeam servers
  • Unexpected network connections from Veeam systems

Network Indicators:

  • Anomalous outbound connections from Veeam servers
  • Unexpected protocol usage on Veeam ports

SIEM Query:

source="veeam" AND (event_type="process_execution" OR event_type="authentication") AND user="domain_user"

🔗 References

📤 Share & Export