Site icon TheCyberThrone

Critical RCE in Veeam Backup & Replication: CVE-2025-59470

Advertisements

Critical remote code execution vulnerability CVE-2025-59470 affects Veeam Backup & Replication, allowing authenticated Backup or Tape Operators to execute code as the postgres user through malicious interval or order parameters.

Technical Breakdown

Veeam assigns this flaw a CVSS v3.1 score of 9.0 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L), rating it as high severity despite the critical score due to privileged access requirements and alignment with their security guidelines. Discovered internally, the vulnerability enables RCE without user interaction but demands high-privilege roles typically restricted in hardened environments. No public exploits exist as of January 8, 2026, though the backup server’s role in critical infrastructure elevates risks.

Scope and Impact

Vulnerable versions include all Veeam Backup & Replication 13 builds before 13.0.1.1071, such as 13.0.1.180 and earlier; version 12.x remains unaffected. Exploitation could compromise backup integrity, leading to data tampering, ransomware deployment, or lateral movement in enterprise networks. Organizations in healthcare, finance, and government face heightened threats given Veeam’s prevalence in backup operations.

Remediation Steps

Exit mobile version