📦 Veeam Backup \& Replication

by Veeam

🔍 What is Veeam Backup \& Replication?

Description coming soon...

🛡️ Security Overview

Click on a severity to filter vulnerabilities

⚠️ Known Vulnerabilities

CVE-2025-59468

CRITICAL CVSS 9.0 Jan 8, 2026

This vulnerability allows a Backup Administrator with legitimate credentials to execute arbitrary code as the postgres user by sending a malicious password parameter during authentication. It affects ...

CVE-2025-59469

CRITICAL CVSS 9.0 Jan 8, 2026

This vulnerability allows users with Backup Operator or Tape Operator privileges to write files with root/system-level permissions, potentially leading to privilege escalation. It affects Veeam Backup...

CVE-2025-59470

CRITICAL CVSS 9.0 Jan 8, 2026

This vulnerability allows authenticated Backup Operators to execute arbitrary code as the postgres user by sending malicious interval or order parameters. It affects Veeam Backup & Replication systems...

CVE-2025-48983

CRITICAL CVSS 9.9 Oct 31, 2025

This critical vulnerability in Veeam Backup & Replication's Mount service allows authenticated domain users to execute arbitrary code on backup infrastructure hosts. Attackers with domain credentials ...

CVE-2024-40711

CRITICAL CVSS 9.8 Sep 7, 2024

CVE-2024-40711 is a critical deserialization vulnerability in Veeam Backup & Replication that allows unauthenticated attackers to execute arbitrary code remotely. This affects organizations using vuln...

CVE-2024-29849

CRITICAL CVSS 9.8 May 22, 2024

CVE-2024-29849 is an authentication bypass vulnerability in Veeam Backup Enterprise Manager that allows unauthenticated attackers to log into the web interface as any user. This affects organizations ...

CVE-2022-26501

CRITICAL CVSS 9.8 Mar 17, 2022

CVE-2022-26501 is an incorrect access control vulnerability in Veeam Backup & Replication that allows unauthenticated attackers to execute arbitrary code with SYSTEM privileges. This affects Veeam Bac...

CVE-2021-35971

CRITICAL CVSS 9.8 Jun 30, 2021

This vulnerability in Veeam Backup and Replication allows remote attackers to execute arbitrary code via insecure .NET remoting deserialization. It affects all organizations running vulnerable version...

CVE-2025-55125

HIGH CVSS 7.8 Jan 8, 2026

This vulnerability allows authenticated Backup or Tape Operators to execute arbitrary code with root privileges by creating a malicious backup configuration file. It affects Veeam Backup & Replication...

CVE-2025-23121

HIGH CVSS 8.8 Jun 19, 2025

This vulnerability allows authenticated domain users to execute arbitrary code on Veeam Backup Servers through improper input validation. It affects organizations using Veeam Backup & Replication soft...

CVE-2025-23120

HIGH CVSS 8.8 Mar 20, 2025

This vulnerability allows remote code execution (RCE) for domain users in Veeam Backup & Replication. Attackers can execute arbitrary code with domain user privileges, potentially compromising backup ...

CVE-2024-42456

HIGH CVSS 8.8 Dec 4, 2024

This vulnerability in Veeam Backup & Replication allows low-privileged users with specific roles to modify critical configuration settings, including trusted client certificates used for authenticatio...

CVE-2024-40717

HIGH CVSS 8.8 Dec 4, 2024

This vulnerability in Veeam Backup & Replication allows authenticated low-privileged users to achieve remote code execution by modifying backup jobs to run malicious scripts. Attackers can schedule th...

CVE-2024-42452

HIGH CVSS 8.8 Dec 4, 2024

A privilege escalation vulnerability in Veeam Backup & Replication allows authenticated low-privileged users to remotely start agents in server mode and obtain credentials, leading to system-level acc...

CVE-2024-42453

HIGH CVSS 8.1 Dec 4, 2024

CVE-2024-42453 is a privilege escalation vulnerability in Veeam Backup & Replication that allows low-privileged users to perform unauthorized actions on connected virtual infrastructure hosts. This in...

CVE-2024-42455

HIGH CVSS 8.1 Dec 4, 2024

A vulnerability in Veeam Backup & Replication allows low-privileged authenticated users to exploit insecure deserialization via remoting services, enabling arbitrary file deletion with service account...

CVE-2024-40715

HIGH CVSS 7.7 Nov 7, 2024

This vulnerability allows attackers to bypass authentication in Veeam Backup & Replication Enterprise Manager by performing a Man-in-the-Middle attack. Organizations using affected versions of this ba...

CVE-2024-40710

HIGH CVSS 8.8 Sep 7, 2024

This CVE describes multiple high-severity vulnerabilities in Veeam Backup & Replication that allow authenticated low-privileged users to execute remote code as the service account and extract sensitiv...

CVE-2024-40713

HIGH CVSS 7.8 Sep 7, 2024

This vulnerability allows low-privileged users in Veeam Backup & Replication to modify Multi-Factor Authentication settings and bypass MFA protection. It affects organizations using Veeam Backup & Rep...

CVE-2024-39718

HIGH CVSS 8.1 Sep 7, 2024

An improper input validation vulnerability in Veeam software allows low-privileged authenticated users to remotely delete files on the system with the permissions of the service account. This affects ...

CVE-2024-29851

HIGH CVSS 7.2 May 22, 2024

This vulnerability in Veeam Backup Enterprise Manager allows authenticated high-privileged users to capture the NTLM hash of the Enterprise Manager service account. This affects organizations using Ve...

CVE-2022-26500

HIGH CVSS 8.8 Mar 17, 2022

CVE-2022-26500 is a path traversal vulnerability in Veeam Backup & Replication that allows authenticated remote attackers to access internal API functions. This enables them to upload and execute arbi...

CVE-2024-42457

MEDIUM CVSS 6.5 Dec 4, 2024

This vulnerability in Veeam Backup & Replication allows authenticated users with operator roles to expose saved credentials by exploiting a remote management interface flaw. Attackers can add a malici...

CVE-2024-42451

MEDIUM CVSS 6.5 Dec 4, 2024

This vulnerability in Veeam Backup & Replication allows authenticated low-privileged users to retrieve all stored credentials in plaintext through external protocol manipulation. Attackers can exploit...