CVE-2025-23120
📋 TL;DR
This vulnerability allows remote code execution (RCE) for domain users in Veeam Backup & Replication. Attackers can execute arbitrary code with domain user privileges, potentially compromising backup infrastructure and sensitive data. Organizations using affected Veeam products are at risk.
💻 Affected Systems
- Veeam Backup & Replication
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full domain compromise leading to data exfiltration, ransomware deployment across network, and complete backup system takeover.
Likely Case
Domain user privilege escalation allowing access to backup data, credential harvesting, and lateral movement within the network.
If Mitigated
Limited impact with proper network segmentation, least privilege access, and monitoring in place.
🎯 Exploit Status
Exploitation requires domain user credentials; technical details are publicly available but no public proof-of-concept exists.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: As specified in Veeam KB4724
Vendor Advisory: https://www.veeam.com/kb4724
Restart Required: No
Instructions:
1. Download the patch from Veeam KB4724. 2. Apply the patch to all affected Veeam Backup & Replication servers. 3. Verify successful installation.
🔧 Temporary Workarounds
Restrict Domain User Access
allLimit domain user access to Veeam Backup & Replication servers to only necessary personnel.
Network Segmentation
allIsolate Veeam Backup & Replication servers from general network access.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Veeam servers
- Apply principle of least privilege to domain user accounts
- Enable detailed logging and monitoring for suspicious activities
🔍 How to Verify
Check if Vulnerable:
Check Veeam Backup & Replication version against the patched version in KB4724.
Check Version:
Check Veeam console or installation directory for version information.
Verify Fix Applied:
Verify the patch version is installed and matches the version specified in KB4724.
📡 Detection & Monitoring
Log Indicators:
- Unusual process execution from Veeam services
- Suspicious authentication attempts to Veeam servers
- Unexpected network connections from Veeam systems
Network Indicators:
- Anomalous outbound connections from Veeam servers
- Unexpected protocol usage on Veeam ports
SIEM Query:
source="veeam" AND (event_type="process_execution" OR event_type="authentication") AND user="domain_user"