CVE-2026-21667
Veeam · Backup & Replication
A vulnerability in the Backup Server allows an authenticated domain user to perform remote code execution, compromising the backup environment.
Executive summary
Veeam Backup & Replication is vulnerable to a critical remote code execution flaw that permits authenticated domain users to take full control of the backup server.
Vulnerability
This vulnerability enables an authenticated domain user to trigger remote code execution (RCE) on the Backup Server. The issue resides in the way the server handles specific requests from authenticated users within the domain environment.
Business impact
An attacker who exploits this vulnerability can compromise the integrity of the entire backup repository, making it impossible to recover data during a disaster. Given the CVSS score of 9.9, the risk to the organization is severe, as it facilitates lateral movement and provides a foothold for large-scale data exfiltration or ransomware deployment.
Remediation
Immediate Action: Apply the latest security updates provided by Veeam to all Backup & Replication instances immediately.
Proactive Monitoring: Monitor for anomalous network traffic originating from domain user accounts directed toward the backup infrastructure management ports.
Compensating Controls: Implement network segmentation to isolate the backup server from general domain traffic and utilize multi-factor authentication for all administrative access.
Exploitation status
Public Exploit Available: No
Analyst recommendation
We recommend that IT administrators treat this as a high-priority emergency patch. Immediate application of the vendor-supplied update is necessary to protect the organization's data recovery capabilities and prevent unauthorized remote code execution.