- Veeam finds security errors that plague a number of its products
- The Bug allows threat actors to run arbitrary commands
- Patches are already available so users are asked to update now
Several Veeam -Backup products were found with a critical severity vulnerability that enabled malicious actors to run arbitrary commands on compromised final points.
The company said the vulnerability was discovered in the VEEAM UPDATER component, enabling threat actors to run the man-in-the-mid (MITM) attack that performed arbitrary codes with root-level permissions. It is now traced as CVE-2025-23114 and comes with a severity of 9.0/10 (critical).
More products are vulnerable, including VEAM -Safety copy for Salesforce (3.1 and older), for Nutanix AHV (5.0 and 5.1), for AWS (6A and 7), for Microsoft Azure (5A and 6), to Google Cloud (4 and 5 ), and Veeam -Safety Copy to Oracle Linux Virtualization Manager and Red Hat Virtualization (3, 4.0 and 4.1).
Patches and risks
The patches are already available, so users are advised to update their products to the latest version to mitigate potential risks. A complete list of patches can be found at this link.
Veeam also emphasized that not everyone is vulnerable: “If a VEEAM Backup & replication installation does not protect AWS, Google Cloud, Microsoft Azure, Nutanix AHV or Oracle Linux VM/Red Hat Virtualization, such an implementation of vulnerability, vulnerability,” said.
Veeam’s solutions are popular with SMBs and businesses, and as such are often targeted. In mid-October last year, scientists warned about cyber criminals who abused a vulnerability in VEEAM BACKUP & REPLICATION, tracked as CVE-2024-40711. This error allowed them to create a local account that they subsequently used to implement two ransomware variants: fog and akira.
The researchers observed a handful of attack attempts. Administrators were asked to upgrade to the latest version to mitigate the risk of exploitation.
Via Hacker the news