CybersecurityNewswireSecurityTechnology

Veeam RCE flaw exposes backup servers to domain user attacks

▼ Summary

– Veeam released security updates to fix critical flaws in Veeam Backup & Replication (VBR), including a remote code execution (RCE) vulnerability (CVE-2025-23121).
– The CVE-2025-23121 flaw affects domain-joined VBR installations and allows authenticated domain users to execute code remotely on the Backup Server.
– Veeam advises against joining backup servers to a Windows domain, recommending a separate Active Directory Forest and two-factor authentication for admin accounts.
– Ransomware gangs frequently target VBR servers to steal data and block recovery efforts, with past exploits linked to Cuba, FIN7, Akira, and Fog ransomware.
– Veeam products are used by over 550,000 customers, including 82% of Fortune 500 companies and 74% of Global 2,000 firms.

Veeam has issued urgent security patches to address multiple vulnerabilities in its Backup & Replication (VBR) software, with one critical flaw allowing attackers to execute malicious code remotely. The most severe issue, identified as CVE-2025-23121, enables authenticated domain users to compromise backup servers with minimal effort.

Discovered by researchers at watchTowr and CodeWhite, this vulnerability specifically targets domain-joined VBR installations. According to Veeam’s advisory, attackers exploiting this flaw could remotely execute arbitrary code on affected systems. The company has resolved the issue in version 12.3.2.3617, urging customers to update immediately.

What makes this flaw particularly dangerous is its accessibility, any domain user can trigger the exploit, bypassing stricter access controls. Many organizations mistakenly integrate backup servers into their primary Windows domains, contrary to Veeam’s security recommendations. Best practices suggest isolating these systems in a dedicated Active Directory Forest and enforcing multi-factor authentication for administrative accounts.

This isn’t the first time Veeam has addressed such risks. Earlier this year, another RCE vulnerability (CVE-2025-23120) was patched, also affecting domain-linked deployments. Cybercriminals have long targeted VBR servers, knowing they provide a direct path to data theft and ransomware deployment. By compromising backups, attackers can cripple recovery efforts, leaving victims with no recourse.

Recent incidents highlight the real-world impact of these flaws. In November, Sophos X-Ops reported that Frag ransomware was exploiting a separate VBR vulnerability (CVE-2024-40711), disclosed in September. Similarly, Akira and Fog ransomware campaigns have weaponized the same weakness since October. Historically, groups like Cuba ransomware and FIN7 have leveraged VBR exploits, often collaborating with notorious ransomware syndicates.

With over 550,000 customers globally, including a significant portion of Fortune 500 and Global 2000 enterprises, Veeam’s widespread adoption makes these vulnerabilities a high-priority concern. Organizations relying on VBR should prioritize updates and review their deployment configurations to mitigate exposure.

(Source: Bleeping Computer)

Topics

veeam backup replication security updates 95% remote code execution vulnerability cve-2025-23121 90% domain-joined vbr installations risk 85% veeam security recommendations 80% ransomware targeting vbr servers 75% previous vbr vulnerabilities cve-2025-23120 cve-2024-40711 70% impact fortune 500 global 2000 companies 65%
Show More

The Wiz

Wiz Consults, home of the Internet is led by "the twins", Wajdi & Karim, experienced professionals who are passionate about helping businesses succeed in the digital world. With over 20 years of experience in the industry, they specialize in digital publishing and marketing, and have a proven track record of delivering results for their clients.