Overview
- Description
- Improper limitation of path names in Veeam Backup & Replication 9.5U3, 9.5U4,10.x, and 11.x allows remote authenticated users access to internal API functions that allows attackers to upload and execute arbitrary code.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6.5
- Impact score
- 6.4
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:P/A:P
Known exploits
Data from CISA
- Vulnerability name
- Veeam Backup & Replication Remote Code Execution Vulnerability
- Exploit added on
- Dec 13, 2022
- Exploit action due
- Jan 3, 2023
- Required action
- Apply updates per vendor instructions.
Weaknesses
- nvd@nist.gov
- CWE-22
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "837D781D-E21B-458C-8D4A-59949CE4D580", "versionEndExcluding": "10.0.1.4854", "versionStartIncluding": "10.0.0.4442" }, { "criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD0C1BCB-A018-4425-AC3D-0CE6EAEF372F", "versionEndExcluding": "11.0.1.1261", "versionStartIncluding": "11.0.0.825" }, { "criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:9.5.0.1536:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BC7D0C1-0A10-4704-B8A0-ADFB8B2BA1BB" }, { "criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:9.5.4.2615:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D5BA0C4-F689-4B0E-BBB5-051DEDF40721" }, { "criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:10.0.1.4854:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12E8F01F-4E41-46F0-94BC-DD5174DDF393" }, { "criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:10.0.1.4854:p20201202:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0417823-7418-4294-BE57-0304772DFE39" }, { "criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:10.0.1.4854:p20210609:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06BE9B78-075C-48E6-817A-5E0A89983EBC" }, { "criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:11.0.1.1261:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC28D606-0A9B-46E5-A88C-8041357979DB" }, { "criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:11.0.1.1261:p20211123:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8158D6BC-2041-4600-B935-AD928621D987" }, { "criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:11.0.1.1261:p20211211:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54A5147A-341A-4790-AAA8-DF2648423C50" } ], "operator": "OR" } ] } ]