Matt Potter
Security Engineer
Veeam Software recently disclosed a critical vulnerability (CVE-2025-23120) in their Backup & Replication product that has significant implications for enterprise security. This vulnerability, discovered by Piotr Bazydlo of watchTowr, represents a serious threat to organizations using Veeam's backup solutions.
The vulnerability allows remote code execution (RCE) on the Backup Server by any authenticated domain user. With a CVSS v3.1 score of 9.9, this is classified as a critical security issue that requires immediate attention.
Key aspects of the vulnerability:
The severity of this vulnerability cannot be overstated. Backup systems are often considered the last line of defense in data protection strategies. A compromise of these systems could lead to:
Veeam has released version 12.3.1 (build 12.3.1.1139) to address this vulnerability. Organizations should:
This vulnerability highlights several important security considerations:
Organizations using Veeam Backup & Replication should treat this vulnerability with the highest priority. The ability for authenticated domain users to execute arbitrary code on backup servers represents a significant security risk that requires immediate attention.
As with any critical vulnerability, attackers will likely attempt to reverse-engineer the patch to exploit unpatched systems. This underscores the importance of prompt patching and maintaining a robust vulnerability management program.
Security Engineer
Matt specializes in infrastructure security and advanced defensive techniques with over 15 years of experience in the cybersecurity industry.