Veeam patches Backup & Replication vulnerabilities, urges users to update
The flaws could allow remote code execution, Veeam has warned
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Veeam has released security updates for four security flaws in its Backup & Replication software.
Veeam Backup & Replication is the backup and recovery engine of Veeam Data Platform, and provides backup, recovery, and replication for virtual, physical, and cloud workloads.
The company claims to have 67% of Global 2000 firms as customers, including Shell, Airbus and Mondelez International, as well as Managed Service Providers (MSPs) offering backup services.
The vulnerabilities affect Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds – but not previous versions. In other words, the vulnerabilities affect 12.x and older.
The Veeam vulnerabilities explained
The first, CVE-2025-59470, has had its severity adjusted to high, with a CVSS score of 9.0. This vulnerability allows a Backup or Tape Operator to perform remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.
Previously rated as critical, its severity was downgraded thanks to the fact that Backup and Tape Operator roles are highly privileged and because security guidelines lowers exploitability.
CVE-2025-55125 is also rated high in severity, with a CVSS score of 7.2. This allows a Backup or Tape Operator to perform remote code execution (RCE) as root by creating a malicious backup configuration file.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The medium-severity CVE-2025-59468, meanwhile, allows a Backup Administrator to perform remote code execution (RCE) as the postgres user by sending a malicious password parameter.
Finally, CVE-2025-59469, with a CVSS score of 7.2, allows a Backup or Tape Operator to write files as root.
Backup systems are prime targets for hackers
Shane Barney, CISO at Keeper Security, said backup systems are a “consistent target” for cyber criminals largely due to the fact they have “broad access across infrastructure”.
"If an attacker gains control of one of these privileged roles – whether through credential theft, misconfiguration or insider misuse – vulnerabilities like this can be used to execute code and weaken an organization’s ability to recover from an attack,” he said.
All the flaws were discovered through internal testing and there's no evidence that they've been exploited in the wild. The company has now released a new version of the software, 13.0.1.1071, to address the vulnerabilities.
Organizations are advised to update immediately. However, they should also work to avoid the risks in the first place, said Barney, by tightly controlling and monitoring privileged access.
"Veeam acted appropriately by disclosing and patching the issue, but the broader lesson for organizations is that patching alone isn’t enough," he said.
"Backup operator accounts should be treated as the most sensitive class of privileged access, with strict access controls, continuous monitoring and minimal standing permissions. When privileged access is tightly governed, the real-world impact of vulnerabilities like this is significantly reduced."
FOLLOW US ON SOCIAL MEDIA
Make sure to follow ITPro on Google News to keep tabs on all our latest news, analysis, and reviews.
You can also follow ITPro on LinkedIn, X, Facebook, and BlueSky.
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
Apple turns 50: ITPro's favorite devicesOpinion From a garage in California to one of the world’s most celebrated companies, Apple has spent five decades building some of our favorite tech products
-
Everest Group taps Ross Tisnovsky to lead CIO practice expansionNews The appointment comes as the research and advisory firm expands support for CIOs navigating digital and AI-driven change.
-
Ubuntu vulnerability exposes enterprises to root escalation, complete system compromiseNews The high-severity Ubuntu vulnerability allows an unprivileged local attacker to escalate privileges through the interaction of two standard system components
-
Security agencies issue warning over critical Cisco Catalyst SD-WAN vulnerabilityNews Threat actors have been exploiting the vulnerability to achieve root access since 2023
-
Using AI to generate passwords is a terrible idea, experts warnNews Researchers have warned the use of AI-generated passwords puts users and businesses at risk
-
Millions of developers could be impacted by flaws in Visual Studio Code extensions – here's what you need to know and how to protect yourselfNews The VS Code vulnerabilities highlight broader IDE security risks, said OX Security
-
Researchers called on LastPass, Dashlane, and Bitwarden to up defenses after severe flaws put 60 million users at risk – here’s how each company respondedNews Analysts at ETH Zurich called for cryptographic standard improvements after a host of password managers were found lacking
-
‘They are able to move fast now’: AI is expanding attack surfaces – and hackers are looking to reap the same rewards as enterprises with the technologyNews Potent new malware strains, faster attack times, and the rise of shadow AI are causing havoc
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
CVEs are set to top 50,000 this year, marking a record high – here’s how CISOs and security teams can prepare for a looming onslaughtNews While the CVE figures might be daunting, they won't all be relevant to your organization
