Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-26501: CVE-2022-26500 | CVE-2022-26501

Veeam Backup & Replication 10.x and 11.x has Incorrect Access Control (issue 1 of 2).

CVE
#vulnerability#auth

KB ID:

4288

Product:

Veeam Backup & Replication | 9.5 | 10 | 11

Published:

2022-03-12

Last Modified:

2022-03-18

By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Notice.

Cheers for trusting us with the spot in your mailbox!

Now you’re less likely to miss what’s been brewing in our knowledge base with this weekly digest

Challenge

Multiple vulnerabilities (CVE-2022-26500, CVE-2022-26501) in Veeam Backup & Replication allow executing malicious code remotely without authentication. This may lead to gaining control over the target system.

Severity: Critical
CVSS v3 score: 9.8

Cause

The Veeam Distribution Service (TCP 9380 by default) allows unauthenticated users to access internal API functions. A remote attacker may send input to the internal API which may lead to uploading and executing of malicious code.

Solution

Patches are available for the following Veeam Backup & Replication versions:

  • 11a (build 11.0.1.1261 P20220302)
  • 10a (build 10.0.1.4854 P20220304)

Notes:

  • The patch must be installed on the Veeam Backup & Replication server. Managed servers with Veeam Distribution Service will be updated automatically after installing the patch.
  • All new deployments of Veeam Backup & Replication version 11a and 10a installed using the ISO images dated 20220302 or later are not vulnerable.
  • If you are using Veeam Backup & Replication 9.5, please upgrade to a supported product version.
  • Temporary mitigation of the vulnerabilities: Stop and disable the Veeam Distribution Service. The Veeam Distribution Service is installed on the Veeam Backup & Replication server and servers specified as distribution servers in Protection Groups.

To submit feedback regarding this article, please click this link: Send Article Feedback
To report a typo on this page, highlight the typo with your mouse and press CTRL + Enter.

Related news

CISA Alert: Veeam Backup and Replication Vulnerabilities Being Exploited in Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two vulnerabilities impacting Veeam Backup & Replication software to its Known Exploited Vulnerabilities (KEV) Catalog, citing evidence of active exploitation in the wild. The now-patched critical flaws, tracked as CVE-2022-26500 and CVE-2022-26501, are both rated 9.8 on the CVSS scoring system, and could be leveraged to

CISA Alert: Veeam Backup and Replication Vulnerabilities Being Exploited in Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two vulnerabilities impacting Veeam Backup & Replication software to its Known Exploited Vulnerabilities (KEV) Catalog, citing evidence of active exploitation in the wild. The now-patched critical flaws, tracked as CVE-2022-26500 and CVE-2022-26501, are both rated 9.8 on the CVSS scoring system, and could be leveraged to

Threat Source newsletter (Dec. 15, 2022): Talos Year in Review is here

The inaugural 2022 Talos Year in Review is here! And it’s taking over the final Threat Source newsletter of the year.

Threat Source newsletter (Dec. 15, 2022): Talos Year in Review is here

The inaugural 2022 Talos Year in Review is here! And it’s taking over the final Threat Source newsletter of the year.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907