- Description
- Improper limitation of path names in Veeam Backup & Replication 9.5U3, 9.5U4,10.x, and 11.x allows remote authenticated users access to internal API functions that allows attackers to upload and execute arbitrary code.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6.5
- Impact score
- 6.4
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:P/A:P
Data from CISA
- Vulnerability name
- Veeam Backup & Replication Remote Code Execution Vulnerability
- Exploit added on
- Dec 13, 2022
- Exploit action due
- Jan 3, 2023
- Required action
- Apply updates per vendor instructions.
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "837D781D-E21B-458C-8D4A-59949CE4D580",
"versionEndExcluding": "10.0.1.4854",
"versionStartIncluding": "10.0.0.4442"
},
{
"criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FD0C1BCB-A018-4425-AC3D-0CE6EAEF372F",
"versionEndExcluding": "11.0.1.1261",
"versionStartIncluding": "11.0.0.825"
},
{
"criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:9.5.0.1536:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3BC7D0C1-0A10-4704-B8A0-ADFB8B2BA1BB"
},
{
"criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:9.5.4.2615:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1D5BA0C4-F689-4B0E-BBB5-051DEDF40721"
},
{
"criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:10.0.1.4854:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "12E8F01F-4E41-46F0-94BC-DD5174DDF393"
},
{
"criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:10.0.1.4854:p20201202:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E0417823-7418-4294-BE57-0304772DFE39"
},
{
"criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:10.0.1.4854:p20210609:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "06BE9B78-075C-48E6-817A-5E0A89983EBC"
},
{
"criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:11.0.1.1261:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "EC28D606-0A9B-46E5-A88C-8041357979DB"
},
{
"criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:11.0.1.1261:p20211123:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8158D6BC-2041-4600-B935-AD928621D987"
},
{
"criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:11.0.1.1261:p20211211:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "54A5147A-341A-4790-AAA8-DF2648423C50"
}
],
"operator": "OR"
}
]
}
]