Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Did the US flinch first in tariff war with China? | Trade War News

May 14, 2025

Tensor9 helps vendors deploy their software into any environment using digital twins

May 14, 2025

Databricks to buy open-source database startup Neon for $1B

May 14, 2025
Facebook X (Twitter) Instagram
Trending
  • Did the US flinch first in tariff war with China? | Trade War News
  • Tensor9 helps vendors deploy their software into any environment using digital twins
  • Databricks to buy open-source database startup Neon for $1B
  • Kosovar Administrator of Cybercrime Marketplace Extradited to US
  • EU Cybersecurity Agency ENISA Launches European Vulnerability Database
  • TensorWave raises $100M to grow its AMD-powered cloud infrastructure
  • Vulnerabilities Patched by Juniper, VMware and Zoom 
  • Fortinet Patches Zero-Day Exploited Against FortiVoice Appliances
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Wednesday, May 14
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Veeam Patches Critical Vulnerability in Backup & Replication
Cybersecurity

Veeam Patches Critical Vulnerability in Backup & Replication

adminBy adminMarch 20, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 57


Backup, recovery, and data protection firm Veeam on Wednesday announced patches for a critical-severity vulnerability in its Backup & Replication product that could allow attackers to execute arbitrary code remotely.

In a scarce advisory, Veeam notes that the security defect, tracked as CVE-2025-23120 (CVSS score of 9.9), could allow for “remote code execution (RCE) by authenticated domain users”, and that Backup & Replication version 12.3.0.310 and previous version 12 builds are affected.

The company recommends updating to Backup & Replication version 12.3.1 (build 12.3.1.1139), which includes patches for the flaw.

According to cybersecurity firm watchTowr, which was credited for reporting the vulnerability, CVE-2025-23120 is rooted in a broader issue within Veeam’s deserialization mechanism, which the company has failed to properly address.

Veeam Backup & Replication, watchTowr says, follows the industry standard of controlling which classes can be deserialized, by implementing an allow-list, but also fails to implement proper deserialization procedures, as one of the allowed classes leads to inner deserialization, which implements a block-list instead.

Veeam’s patches for previously reported deserialization flaws involved adding entries to the block-list, and, due to this configuration and Backup & Replication’s large codebase, new deserialization gadgets that can be exploited to achieve code execution can still be found, watchTowr says.

CVE-2025-23120, the cybersecurity firm explains, can be linked to CVE-2024-40711, a critical-severity RCE flaw disclosed in September 2024 and exploited in ransomware attacks less than a month later.

It can also be linked to CVE-2024-42455, a high-severity bug allowing “an authenticated user with a role assigned in the Users and Roles settings on the backup server to connect to remote services and exploit insecure deserialization by sending a serialized temporary file collection, thereby enabling the deletion of any file on the system with service account privileges”.

Advertisement. Scroll to continue reading.

Essentially, watchTowr says, an attacker can identify this type of issues in Backup & Replication by searching the product’s codebase for deserialization gadgets that are not block-listed, and which could have a malicious impact.

The cybersecurity firm itself identified two such issues (collectively tracked as CVE-2025-23120), including one that can be exploited by modifying proof-of-concept (PoC) code targeting CVE-2024-40711.

watchTowr also warns that, while the exploitation of the new vulnerability requires for the attacker to be logged in, “the authentication requirement is fairly weak.”

Related: Veeam Warns of Critical Vulnerability in Service Provider Console

Related: Veeam Patches High-Severity Vulnerability as Exploitation of Previous Flaw Expands

Related: Year-Old Veeam Vulnerability Exploited in Fresh Ransomware Attacks

Related: Critical Veeam Vulnerability Leads to Authentication Bypass



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

Kosovar Administrator of Cybercrime Marketplace Extradited to US

May 14, 2025

EU Cybersecurity Agency ENISA Launches European Vulnerability Database

May 14, 2025

Vulnerabilities Patched by Juniper, VMware and Zoom 

May 14, 2025

Fortinet Patches Zero-Day Exploited Against FortiVoice Appliances

May 14, 2025

Ivanti Patches Two EPMM Zero-Days Exploited to Hack Customers

May 14, 2025

ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact 

May 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Don't Miss
Billionaires

Skechers’ Greenbergs Set To Pocket Up To $1.1 Billion From Sale To 3G

May 6, 2025

Skechers founders Robert Greenberg (left) and Michael Greenberg (right) started the brand more than 30…

Trump Organization Admits President Still Controls His Business

May 6, 2025

Forbes Richest Person In Every State 2025

April 30, 2025

These Billionaire Signers Of The Giving Pledge Signers On Why The Philanthropy Group Still Matters

April 29, 2025
Our Picks

Did the US flinch first in tariff war with China? | Trade War News

May 14, 2025

Tensor9 helps vendors deploy their software into any environment using digital twins

May 14, 2025

Databricks to buy open-source database startup Neon for $1B

May 14, 2025

Kosovar Administrator of Cybercrime Marketplace Extradited to US

May 14, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

Tensor9 helps vendors deploy their software into any environment using digital twins

May 14, 2025

Databricks to buy open-source database startup Neon for $1B

May 14, 2025

TensorWave raises $100M to grow its AMD-powered cloud infrastructure

May 14, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.