Veeam reports critical flaws in their Backup & Replication product, asks for urgent patching
Take action: If you're running Veeam Backup & Replication that's joined to a Windows domain, this is urgent. Update to to B&R version 12.3.2.4165 ASAP, because any user on the domain can hack your Veeam. Or they get hacked and then the attacker hacks the Veeam. If you are running Veeam Agent for Windows v6, update it, but that's a lower priority. Remind everyone of risks of phishing.
Learn More
Veeam has released patches for multiple vulnerabilities in Veeam Backup & Replication and Veeam Agent for Microsoft Windows, including two critical severity remote code execution flaws. The flaws could allow authenticated domain users to execute arbitrary code on backup infrastructure hosts and servers, leading to complete compromise of backup systems.
Vulnerabilities summary:
- CVE-2025-48983 (CVSS score 9.9): A vulnerability in the Mount service of Veeam Backup & Replication that allows for remote code execution on backup infrastructure hosts by an authenticated domain user. This flaw impacts domain-joined Veeam Backup & Replication v12 backup infrastructure servers.
- CVE-2025-48984 (CVSS score 9.9): A vulnerability allowing remote code execution on the Backup Server by an authenticated domain user. It also affects domain-joined Veeam Backup & Replication v12 backup servers.
- CVE-2025-48982 (CVSS score 7.3): A vulnerability in Veeam Agent for Microsoft Windows that allows for local privilege escalation if a system administrator is tricked into restoring a malicious file. This flaw requires social engineering to exploit successfully.
Affected versions include all Veeam Backup & Replication version 12 builds up to and including 12.3.2.3617, as well as Veeam Agent for Microsoft Windows versions 6.3.2.1205 and all earlier version 6 builds.
The vendor has noted that unsupported product versions have not been tested but are likely affected and should be considered vulnerable.
Veeam has released patch 12.3.2.4165 for Backup & Replication and build 6.3.2.1302 for Veeam Agent for Microsoft Windows to address these flaws. The Veeam Software Appliance and the upcoming Veeam Backup & Replication v13 software for Microsoft Windows are architecturally not impacted by the remote code execution vulnerabilities.