We would like to bring your attention to the following unauthenticated remote code execution vulnerability within Veeam Backup & Replication. This issue is being tracked as CVE-2022-26500 & CVE-2022-26501 and has been given the CVSS v3 score of 9.8.
At this time we are unaware of any proof of concept attacks or exploits for this issue being available in the wild, we will continue to monitor the situation around this.
Am I Effected?
Versions of Veeam prior to the following versions are known to be vulnerable (including the unsupported version 9.5):
-
11a (build 11.0.1.1261 P20220302)
-
10a (build 10.0.1.4854 P20220304)
Remediation
Apply the patches provided by Veeam to your Veeam Backup and Replication Server:
References
-
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26500
-
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26501

What is Breach and Attack Simulation (BAS)?
Read our guide to find out what Breach and Attack Simulation (BAS) is, how it works, why and how it’s important, and some best practices.

Best red team tools for your cybersecurity strategy
Read our blog to find out the best red team tools to use for your cybersecurity strategy, how to choose and use them.

What is vulnerability scanning and why is it important?
Read our comprehensive guide on vulnerability scanning, including what it is, why it’s important, how it works & best practices for organizations.