Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Tycoon2FA Phishing Service Resumes Activity Post-Takedown

March 23, 2026

GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers

March 23, 2026

Cybersecurity Staff Don’t Know How Fast They Could Stop AI Attacks

March 23, 2026
Facebook X (Twitter) Instagram
Tuesday, March 24
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution
News

Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution

Team-CWDBy Team-CWDMarch 21, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Veeam has released security updates to address multiple critical vulnerabilities in its Backup & Replication software that, if successfully exploited, could result in remote code execution.

The vulnerabilities are as follows –

  • CVE-2026-21666 (CVSS score: 9.9) – A vulnerability that allows an authenticated domain user to perform remote code execution on the Backup Server.
  • CVE-2026-21667 (CVSS score: 9.9) – A vulnerability that allows an authenticated domain user to perform remote code execution on the Backup Server.
  • CVE-2026-21668 (CVSS score: 8.8) – A vulnerability that allows an authenticated domain user to bypass restrictions and manipulate arbitrary files on a Backup Repository.
  • CVE-2026-21672 (CVSS score: 8.8) – A vulnerability that allows local privilege escalation on Windows-based Veeam Backup & Replication servers.
  • CVE-2026-21708 (CVSS score: 9.9) – A vulnerability that allows a Backup Viewer to perform remote code execution as the postgres user.

The shortcomings, which affect Veeam Backup & Replication 12.3.2.4165 and all earlier version 12 builds, have been addressed in version 12.3.2.4465. CVE-2026-21672 and CVE-2026-21708 have also been fixed in Backup & Replication 13.0.1.2067, along with two more critical security flaws –

  • CVE-2026-21669 (CVSS score: 9.9) – A vulnerability that allows an authenticated domain user to perform remote code execution on the Backup Server.
  • CVE-2026-21671 (CVSS score: 9.1) – A vulnerability that allows an authenticated user with the Backup Administrator role to perform remote code execution in high availability (HA) deployments of Veeam Backup & Replication.

“It’s important to note that once a vulnerability and its associated patch are disclosed, attackers will likely attempt to reverse-engineer the patch to exploit unpatched deployments of Veeam software,” the company said in its advisory.

With vulnerabilities in Veeam software having been repeatedly exploited by threat actors to carry out ransomware attacks in the past, it’s essential that users update their instances to the latest version to safeguard against any potential threat.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleRust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays
Next Article Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries
Team-CWD
  • Website

Related Posts

News

Tycoon2FA Phishing Service Resumes Activity Post-Takedown

March 23, 2026
News

GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers

March 23, 2026
News

Trivy Supply Chain Attack Expands With New Compromised Docker Images

March 23, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

September 5, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

A quick guide to recovering a hacked account

March 21, 2026

When ‘hacking’ your game becomes a security risk

October 17, 2025

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.