Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

The Future of Cybersecurity Includes Non-Human Employees

January 11, 2026

Veeam Patches Critical RCE Vulnerability with CVSS 9.0 in Backup & Replication

January 11, 2026

Microsoft Warns Misconfigured Email Routing Can Enable Internal Domain Phishing

January 11, 2026
Facebook X (Twitter) Instagram
Sunday, January 11
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Veeam Patches Critical RCE Vulnerability with CVSS 9.0 in Backup & Replication
News

Veeam Patches Critical RCE Vulnerability with CVSS 9.0 in Backup & Replication

Team-CWDBy Team-CWDJanuary 11, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Veeam has released security updates to address multiple flaws in its Backup & Replication software, including a “critical” issue that could result in remote code execution (RCE).

The vulnerability, tracked as CVE-2025-59470, carries a CVSS score of 9.0.

“This vulnerability allows a Backup or Tape Operator to perform remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter,” it said in a Tuesday bulletin.

According to Veeam’s documentation, a user with a Backup Operator role can start and stop existing jobs; export backups; copy backups; and create VeeamZip backups. A Tape Operator user, on the other hand, can run tape backup jobs or tape catalog jobs; eject tapes; import and export tapes; move tapes to a media pool; copy or erase tapes; and set a tape password.

In other words, these roles are considered highly privileged, and organizations should already be taking adequate protections to prevent them from being misused.

Veeam said it’s treating the shortcoming as “high severity” despite the CVSS score, stating the opportunity for exploitation is reduced if customers follow Veeam’s recommended Security Guidelines.

Also addressed by the company are three other vulnerabilities in the same product –

  • CVE-2025-55125 (CVSS score: 7.2) – A vulnerability that allows a Backup or Tape Operator to perform RCE as root by creating a malicious backup configuration file
  • CVE-2025-59468 (CVSS score: 6.7) – A vulnerability that allows a Backup Administrator to perform RCE as the postgres user by sending a malicious password parameter
  • CVE-2025-59469 (CVSS score: 7.2) – A vulnerability that allows a Backup or Tape Operator to write files as root

All four identified vulnerabilities affect Veeam Backup & Replication 13.0.1.180 and all earlier versions of 13 builds. They have been addressed in Backup & Replication version 13.0.1.1071.

While Veeam makes no mention of the flaws being exploited in the wild, it’s essential that users promptly apply the fixes, given that vulnerabilities in the software have been exploited by threat actors in the past.



Source

computer security cyber attacks cyber news cyber security news cyber security news today cyber security updates cyber updates data breach hacker news hacking news how to hack information security network security ransomware malware software vulnerability the hacker news
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMicrosoft Warns Misconfigured Email Routing Can Enable Internal Domain Phishing
Next Article The Future of Cybersecurity Includes Non-Human Employees
Team-CWD
  • Website

Related Posts

News

The Future of Cybersecurity Includes Non-Human Employees

January 11, 2026
News

Microsoft Warns Misconfigured Email Routing Can Enable Internal Domain Phishing

January 11, 2026
News

Ongoing Attacks Exploiting Critical RCE Vulnerability in Legacy D-Link DSL Routers

January 10, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What is it, and how do I get it off my device?

September 11, 2025

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

When ‘hacking’ your game becomes a security risk

October 17, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.