CVE-2025-48982

7.8 HIGH

📋 TL;DR

This vulnerability in Veeam Agent for Microsoft Windows allows local attackers to escalate privileges to SYSTEM level by tricking an administrator into restoring a malicious file. It affects systems where Veeam Agent is installed and administrators perform restore operations. The attack requires social engineering to convince an admin to restore a specially crafted file.

💻 Affected Systems

Products:
  • Veeam Agent for Microsoft Windows
Versions: All versions prior to the fix
Operating Systems: Microsoft Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Veeam Agent to be installed and an administrator to perform a restore operation on a malicious file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, allowing installation of persistent malware, credential theft, and full control over the Windows system.

🟠

Likely Case

Local privilege escalation to SYSTEM level, enabling attackers to bypass security controls, install backdoors, or access sensitive data.

🟢

If Mitigated

Limited impact if administrators follow strict restore procedures and verify file sources before restoration.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring administrator interaction with malicious files.
🏢 Internal Only: MEDIUM - Internal attackers could potentially trick administrators into restoring malicious files, especially in environments with lax restore procedures.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to convince an administrator to restore a malicious file, making it more complex than automated attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Veeam KB4771 for specific patched versions

Vendor Advisory: https://www.veeam.com/kb4771

Restart Required: Yes

Instructions:

1. Visit Veeam KB4771 advisory. 2. Download and install the latest Veeam Agent for Microsoft Windows update. 3. Restart the system to complete the installation.

🔧 Temporary Workarounds

Restrict Restore Permissions

windows

Limit which users can perform restore operations to only trusted administrators who follow strict verification procedures.

File Source Verification

all

Implement policies requiring administrators to verify the source and integrity of all files before restoration.

🧯 If You Can't Patch

  • Implement strict restore procedures requiring multi-person verification before any file restoration
  • Monitor and audit all restore operations for unusual activity or untrusted file sources

🔍 How to Verify

Check if Vulnerable:

Check Veeam Agent version against the patched versions listed in Veeam KB4771

Check Version:

Open Veeam Agent for Microsoft Windows and check Help > About for version information

Verify Fix Applied:

Verify Veeam Agent version is updated to the patched version specified in the advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual restore operations from untrusted sources
  • Multiple failed restore attempts
  • Restore operations by non-standard administrators

Network Indicators:

  • No specific network indicators as this is a local privilege escalation

SIEM Query:

EventID=4688 AND ProcessName LIKE '%Veeam%' AND CommandLine LIKE '%restore%'

🔗 References

📤 Share & Export