• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution

You are here: Home / General Cyber Security News / Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution
March 13, 2026

Veeam has released security updates to address multiple critical vulnerabilities in its Backup & Replication software that, if successfully exploited, could result in remote code execution.

The vulnerabilities are as follows –

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


  • CVE-2026-21666 (CVSS score: 9.9) – A vulnerability that allows an authenticated domain user to perform remote code execution on the Backup Server.
  • CVE-2026-21667 (CVSS score: 9.9) – A vulnerability that allows an authenticated domain user to perform remote code execution on the Backup Server.
  • CVE-2026-21668 (CVSS score: 8.8) – A vulnerability that allows an authenticated domain user to bypass restrictions and manipulate arbitrary files on a Backup Repository.
  • CVE-2026-21672 (CVSS score: 8.8) – A vulnerability that allows local privilege escalation on Windows-based Veeam Backup & Replication servers.
  • CVE-2026-21708 (CVSS score: 9.9) – A vulnerability that allows a Backup Viewer to perform remote code execution as the postgres user.

Cybersecurity

The shortcomings, which affect Veeam Backup & Replication 12.3.2.4165 and all earlier version 12 builds, have been addressed in version 12.3.2.4465. CVE-2026-21672 and CVE-2026-21708 have also been fixed in Backup & Replication 13.0.1.2067, along with two more critical security flaws –

  • CVE-2026-21669 (CVSS score: 9.9) – A vulnerability that allows an authenticated domain user to perform remote code execution on the Backup Server.
  • CVE-2026-21671 (CVSS score: 9.1) – A vulnerability that allows an authenticated user with the Backup Administrator role to perform remote code execution in high availability (HA) deployments of Veeam Backup & Replication.

“It’s important to note that once a vulnerability and its associated patch are disclosed, attackers will likely attempt to reverse-engineer the patch to exploit unpatched deployments of Veeam software,” the company said in its advisory.

With vulnerabilities in Veeam software having been repeatedly exploited by threat actors to carry out ransomware attacks in the past, it’s essential that users update their instances to the latest version to safeguard against any potential threat.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «rust based venon malware targets 33 brazilian banks with credential stealing overlays Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution
  • Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays
  • Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks
  • How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs
  • ThreatsDay Bulletin: OAuth Trap, EDR Killer, Signal Phishing, Zombie ZIP, AI Platform Hack & More
  • Attackers Don’t Just Send Phishing Emails. They Weaponize Your SOC’s Workload
  • Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit
  • Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets
  • CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed
  • Researchers Trick Perplexity’s Comet AI Browser Into Phishing Scam in Under Four Minutes

Copyright © TheCyberSecurity.News, All Rights Reserved.