CVE-2025-23121

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated domain users to execute arbitrary code on Veeam Backup Servers through improper input validation. It affects organizations using Veeam Backup & Replication software where domain users have access to backup infrastructure. The vulnerability stems from code injection (CWE-94) in specific components.

💻 Affected Systems

Products:
  • Veeam Backup & Replication
Versions: Specific versions mentioned in KB4743 (check advisory for exact range)
Operating Systems: Windows Server (where Veeam Backup Server is installed)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires domain authentication; affects backup server components handling specific operations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of backup infrastructure leading to data theft, ransomware deployment across backup targets, and lateral movement to production systems.

🟠

Likely Case

Attackers with domain credentials gain persistent access to backup servers, potentially exfiltrating sensitive backup data or deploying malware.

🟢

If Mitigated

Limited impact due to network segmentation, least privilege access, and proper monitoring detecting unusual authentication patterns.

🌐 Internet-Facing: LOW (Backup servers should not be internet-facing; if they are, risk becomes HIGH)
🏢 Internal Only: HIGH (Authenticated domain users can exploit from within the network)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW (once authenticated)

Exploitation requires valid domain credentials and network access to backup server.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check KB4743 for specific patched versions

Vendor Advisory: https://www.veeam.com/kb4743

Restart Required: Yes

Instructions:

1. Review KB4743 for affected versions. 2. Download and install the appropriate patch from Veeam. 3. Restart Veeam Backup services or the server as required. 4. Verify patch installation through version check.

🔧 Temporary Workarounds

Restrict Domain User Access

windows

Limit which domain users can authenticate to Veeam Backup Server through group policy or access controls.

Network Segmentation

all

Isolate backup servers from general user networks to reduce attack surface.

🧯 If You Can't Patch

  • Implement strict network access controls to backup servers (firewall rules, VLAN segmentation)
  • Enforce least privilege: remove unnecessary domain user access to backup infrastructure

🔍 How to Verify

Check if Vulnerable:

Check Veeam Backup & Replication version against affected versions listed in KB4743.

Check Version:

In Veeam Backup & Replication console: Help → About, or check Windows Programs and Features

Verify Fix Applied:

Verify installed version matches patched version from KB4743 and check for successful patch installation logs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns to backup server
  • Unexpected process execution from Veeam services
  • Error logs related to code injection in backup components

Network Indicators:

  • Suspicious connections to backup server from non-admin workstations
  • Unusual outbound traffic from backup server

SIEM Query:

source="veeam_logs" AND (event_id="4624" OR event_id="4688") AND user="domain_user" AND process="*veeam*"

🔗 References

📤 Share & Export