CVE-2025-59470

9.0 CRITICAL

📋 TL;DR

This vulnerability allows authenticated Backup Operators to execute arbitrary code as the postgres user by sending malicious interval or order parameters. It affects Veeam Backup & Replication systems where Backup Operators have access. The high CVSS score reflects the potential for complete system compromise.

💻 Affected Systems

Products:
  • Veeam Backup & Replication
Versions: Specific versions not provided in reference; check Veeam KB4792 for exact affected versions
Operating Systems: Windows Server (primary deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Backup Operator role access; postgres database component must be present and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to data theft, ransomware deployment, lateral movement across the network, and persistent backdoor installation.

🟠

Likely Case

Unauthorized access to sensitive backup data, credential harvesting from the postgres database, and potential privilege escalation to domain administrator.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access, and monitoring are in place, potentially only affecting the backup system itself.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated Backup Operator access; the vulnerability involves command injection through specific parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Veeam KB4792 for specific patched versions

Vendor Advisory: https://www.veeam.com/kb4792

Restart Required: Yes

Instructions:

1. Review Veeam KB4792 for exact affected versions and patches. 2. Download and apply the appropriate patch from Veeam. 3. Restart Veeam services or the server as required. 4. Verify the patch is applied successfully.

🔧 Temporary Workarounds

Restrict Backup Operator Access

all

Temporarily remove or restrict Backup Operator privileges to only essential personnel until patching is complete.

Network Segmentation

all

Isolate Veeam backup servers from critical network segments and implement strict firewall rules.

🧯 If You Can't Patch

  • Implement strict access controls: Limit Backup Operator roles to trusted users only and monitor their activities closely.
  • Enhance monitoring: Set up alerts for unusual postgres database activity or parameter manipulation attempts in Veeam logs.

🔍 How to Verify

Check if Vulnerable:

Check your Veeam Backup & Replication version against the affected versions listed in Veeam KB4792.

Check Version:

In Veeam Backup & Replication console: Help > About, or check the installed version in Windows Programs and Features.

Verify Fix Applied:

Verify the installed version matches or exceeds the patched version specified in Veeam KB4792.

📡 Detection & Monitoring

Log Indicators:

  • Unusual postgres process executions
  • Suspicious parameter values in Veeam backup logs (e.g., interval or order parameters with shell metacharacters)
  • Failed authentication attempts by Backup Operators

Network Indicators:

  • Unexpected outbound connections from the Veeam server post-patching
  • Anomalous traffic to/from the postgres database port

SIEM Query:

source="veeam_logs" AND (parameter="interval" OR parameter="order") AND value MATCHES "[;|&`$()]"

🔗 References

📤 Share & Export