Veeam patches Backup & Replication vulnerabilities, urges users to update
The flaws could allow remote code execution, Veeam has warned
Veeam has released security updates for four security flaws in its Backup & Replication software.
Veeam Backup & Replication is the backup and recovery engine of Veeam Data Platform, and provides backup, recovery, and replication for virtual, physical, and cloud workloads.
The company claims to have 67% of Global 2000 firms as customers, including Shell, Airbus and Mondelez International, as well as Managed Service Providers (MSPs) offering backup services.
The vulnerabilities affect Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds – but not previous versions. In other words, the vulnerabilities affect 12.x and older.
The Veeam vulnerabilities explained
The first, CVE-2025-59470, has had its severity adjusted to high, with a CVSS score of 9.0. This vulnerability allows a Backup or Tape Operator to perform remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.
Previously rated as critical, its severity was downgraded thanks to the fact that Backup and Tape Operator roles are highly privileged and because security guidelines lowers exploitability.
CVE-2025-55125 is also rated high in severity, with a CVSS score of 7.2. This allows a Backup or Tape Operator to perform remote code execution (RCE) as root by creating a malicious backup configuration file.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The medium-severity CVE-2025-59468, meanwhile, allows a Backup Administrator to perform remote code execution (RCE) as the postgres user by sending a malicious password parameter.
Finally, CVE-2025-59469, with a CVSS score of 7.2, allows a Backup or Tape Operator to write files as root.
Backup systems are prime targets for hackers
Shane Barney, CISO at Keeper Security, said backup systems are a “consistent target” for cyber criminals largely due to the fact they have “broad access across infrastructure”.
"If an attacker gains control of one of these privileged roles – whether through credential theft, misconfiguration or insider misuse – vulnerabilities like this can be used to execute code and weaken an organization’s ability to recover from an attack,” he said.
All the flaws were discovered through internal testing and there's no evidence that they've been exploited in the wild. The company has now released a new version of the software, 13.0.1.1071, to address the vulnerabilities.
Organizations are advised to update immediately. However, they should also work to avoid the risks in the first place, said Barney, by tightly controlling and monitoring privileged access.
"Veeam acted appropriately by disclosing and patching the issue, but the broader lesson for organizations is that patching alone isn’t enough," he said.
"Backup operator accounts should be treated as the most sensitive class of privileged access, with strict access controls, continuous monitoring and minimal standing permissions. When privileged access is tightly governed, the real-world impact of vulnerabilities like this is significantly reduced."
FOLLOW US ON SOCIAL MEDIA
Make sure to follow ITPro on Google News to keep tabs on all our latest news, analysis, and reviews.
You can also follow ITPro on LinkedIn, X, Facebook, and BlueSky.
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
Google is overhauling Gmail with new Gemini AI features – here’s how to turn them offNews Google has announced plans for deeper AI integration within Gmail to help users automate inboxes, here's how to turn the features off.
-
Are AI cyber threats overhyped?ITPro Podcast As cyber teams turn to the threats posed by AI, rising attacks by state-sponsored groups and ransomware gangs remain the biggest threat
-
NHS supplier DXS International confirms cyber attack – here’s what we know so farNews The NHS supplier says front-line clinical services are unaffected
-
Two Fortinet vulnerabilities are being exploited in the wild – patch nowNews Arctic Wolf and Rapid7 said security teams should act immediately to mitigate the Fortinet vulnerabilities
-
Everything you need to know about Google and Apple’s emergency zero-day patchesNews A serious zero-day bug was spotted in Chrome systems that impacts Apple users too, forcing both companies to issue emergency patches
-
LastPass hit with ICO fine after 2022 data breach exposed 1.6 million users – here’s how the incident unfoldedNews The impact of the LastPass breach was felt by customers as late as December 2024
-
Researchers claim Salt Typhoon masterminds learned their trade at Cisco Network AcademyNews The Salt Typhoon hacker group has targeted telecoms operators and US National Guard networks in recent years
-
Trend Micro issues warning over rise of 'vibe crime' as cyber criminals turn to agentic AI to automate attacksNews Trend Micro is warning of a boom in 'vibe crime' - the use of agentic AI to support fully-automated cyber criminal operations and accelerate attacks.
-
Cyber budget cuts are slowing down, but that doesn't mean there's light on the horizon for security teamsNews A new ISC2 survey indicates that both layoffs and budget cuts are on the decline
-
NCSC issues urgent warning over growing AI prompt injection risks – here’s what you need to knowNews Many organizations see prompt injection as just another version of SQL injection - but this is a mistake
