- Veeam finds that security errors affect several of their products
- The error allows threat actors to execute arbitrary commands
- Pathers are already available, so users have instructions to update now
Multiple Veeam backup products were found that carry a vulnerability of critical serious that allowed malicious actors to execute arbitrary commands in compromised final points.
The company said that vulnerability was discovered in the Veeam Updater component, allowing threat actors to execute man attacks in the middle (MITM), executing arbitrary codes with permits at the root level. Now it is traced as CVE-2025-23114, and comes with a gravity score of 9.0/10 (critic).
Multiple products are vulnerable, including Veeam’s backup for Salesforce (3.1 and more), for Nutanix AHV (5.0 and 5.1), for AWS (6a and 7), for Microsoft Azure (5a and 6), for Google Cloud ( 4 and 5) and Veeam Backup for Oracle Linux Virtualization Manager and Red Hat Virtualization (3, 4.0 and 4.1).
Patches and risks
Pathers are already available, so users are recommended to update their products to the most recent version to mitigate potential risks. You can find a complete list of patches in this link.
Veeam also emphasized that not all are vulnerable: “If a backup and replication implementation of Veeam does not protect AWS, Google Cloud, Microsoft Azure, Nutanix AHV or Oracle Linux VM/Red Hat Virtualization, such deployment is not affected by the Vulnerability, vulnerability, “he said.
Veeam solutions are popular between SMEs and companies, and as such they often are directed. In mid-October last year, the researchers warned about cybercriminals who abuse vulnerability in Veeam Backup & Replication, tracked as CVE-2024-40711. This error allowed them to create a local account that later used to implement two ransomware variants: FOG and AKIRA.
The researchers observed a handful of attack attempts. Administrators were advised to update to the latest version to mitigate the risk of exploitation.
Through The hacker news