Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Morocco hopes to boost legal cannabis farming

December 14, 2025

How to reduce financial stress during the holiday season

December 13, 2025

The Indigenous women behind Mexican President Claudia Sheinbaum’s ‘most stylish’ looks

December 12, 2025
Facebook X (Twitter) Instagram
Trending
  • Morocco hopes to boost legal cannabis farming
  • How to reduce financial stress during the holiday season
  • The Indigenous women behind Mexican President Claudia Sheinbaum’s ‘most stylish’ looks
  • Online rise of Eastern Orthodoxy tests its clergy
  • Hanukkah is Judaism’s ‘festival of lights’
  • Skydiver dangles at 15,000 feet after parachute tangles on plane’s tail
  • Buenos Aires dance hall guarantees tango sessions with pro partners
  • MacKenzie Scott’s Latest Gifts Make Her America’s Third Most Generous Philanthropist
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Sunday, December 14
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Veeam Patches Critical Vulnerability in Backup & Replication
Cybersecurity

Veeam Patches Critical Vulnerability in Backup & Replication

By adminMarch 20, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 170


Backup, recovery, and data protection firm Veeam on Wednesday announced patches for a critical-severity vulnerability in its Backup & Replication product that could allow attackers to execute arbitrary code remotely.

In a scarce advisory, Veeam notes that the security defect, tracked as CVE-2025-23120 (CVSS score of 9.9), could allow for “remote code execution (RCE) by authenticated domain users”, and that Backup & Replication version 12.3.0.310 and previous version 12 builds are affected.

The company recommends updating to Backup & Replication version 12.3.1 (build 12.3.1.1139), which includes patches for the flaw.

According to cybersecurity firm watchTowr, which was credited for reporting the vulnerability, CVE-2025-23120 is rooted in a broader issue within Veeam’s deserialization mechanism, which the company has failed to properly address.

Veeam Backup & Replication, watchTowr says, follows the industry standard of controlling which classes can be deserialized, by implementing an allow-list, but also fails to implement proper deserialization procedures, as one of the allowed classes leads to inner deserialization, which implements a block-list instead.

Veeam’s patches for previously reported deserialization flaws involved adding entries to the block-list, and, due to this configuration and Backup & Replication’s large codebase, new deserialization gadgets that can be exploited to achieve code execution can still be found, watchTowr says.

CVE-2025-23120, the cybersecurity firm explains, can be linked to CVE-2024-40711, a critical-severity RCE flaw disclosed in September 2024 and exploited in ransomware attacks less than a month later.

It can also be linked to CVE-2024-42455, a high-severity bug allowing “an authenticated user with a role assigned in the Users and Roles settings on the backup server to connect to remote services and exploit insecure deserialization by sending a serialized temporary file collection, thereby enabling the deletion of any file on the system with service account privileges”.

Advertisement. Scroll to continue reading.

Essentially, watchTowr says, an attacker can identify this type of issues in Backup & Replication by searching the product’s codebase for deserialization gadgets that are not block-listed, and which could have a malicious impact.

The cybersecurity firm itself identified two such issues (collectively tracked as CVE-2025-23120), including one that can be exploited by modifying proof-of-concept (PoC) code targeting CVE-2024-40711.

watchTowr also warns that, while the exploitation of the new vulnerability requires for the attacker to be logged in, “the authentication requirement is fairly weak.”

Related: Veeam Warns of Critical Vulnerability in Service Provider Console

Related: Veeam Patches High-Severity Vulnerability as Exploitation of Previous Flaw Expands

Related: Year-Old Veeam Vulnerability Exploited in Fresh Ransomware Attacks

Related: Critical Veeam Vulnerability Leads to Authentication Bypass



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply

Don't Miss
Billionaires

MacKenzie Scott’s Latest Gifts Make Her America’s Third Most Generous Philanthropist

December 11, 2025

Photo by JORG CARSTENSEN/dpa/AFP via Getty ImagesOn Tuesday, billionaire philanthropist MacKenzie Scott published her yearly…

Indonesian Billionaires Cash In On Gold Surge

December 10, 2025

Kalshi’s Cofounder Is Now World’s Youngest Self-Made Woman Billionaire

December 2, 2025

Billionaire Kwek Leng Beng’s CDL Expands In London With $370 Million Holiday Inn Deal

December 2, 2025
Our Picks

Morocco hopes to boost legal cannabis farming

December 14, 2025

How to reduce financial stress during the holiday season

December 13, 2025

The Indigenous women behind Mexican President Claudia Sheinbaum’s ‘most stylish’ looks

December 12, 2025

Online rise of Eastern Orthodoxy tests its clergy

December 12, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.