Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Veeam Fixes Critical Flaws in Backup Software

Veeam Fixes Critical Flaws in Backup Software

Posted on March 13, 2026 By CWS

Veeam has rolled out essential security patches to mitigate severe vulnerabilities in its Backup & Replication software. These vulnerabilities, if left unaddressed, could enable unauthorized remote code execution, posing a significant threat to user security.

Critical Vulnerabilities Identified

The identified vulnerabilities include CVE-2026-21666 and CVE-2026-21667, both carrying a high CVSS score of 9.9. These flaws permit authenticated domain users to execute remote code on the Backup Server. Another notable vulnerability, CVE-2026-21668, with a CVSS score of 8.8, allows bypassing restrictions to manipulate files on a Backup Repository. Additionally, CVE-2026-21672 and CVE-2026-21708 also highlight serious security concerns, such as local privilege escalation and remote code execution as the postgres user, respectively.

Software Versions Affected

These vulnerabilities impact Veeam Backup & Replication version 12.3.2.4165 and all prior versions. The company has addressed these issues in version 12.3.2.4465. Furthermore, the latest version 13.0.1.2067 resolves CVE-2026-21672 and CVE-2026-21708, alongside two additional critical vulnerabilities, CVE-2026-21669 and CVE-2026-21671.

Importance of Timely Updates

Veeam emphasizes the urgency of applying these updates, as attackers commonly attempt to reverse-engineer patches post-disclosure to exploit unpatched systems. With a history of Veeam software being targeted in ransomware attacks, updating to the latest version is crucial for user protection against emerging threats.

By staying informed and promptly applying security updates, users can significantly reduce their risk and ensure the integrity of their backup systems against potential exploitation.

The Hacker News Tags:backup security, CVE, Cybersecurity, enterprise security, IT security, ransomware protection, remote code execution, software updates, Veeam, vulnerability patch

Post navigation

Previous Post: Critical OpenSSH GSSAPI Flaw Threatens Linux Servers
Next Post: Global Crackdown Dismantles SocksEscort Proxy Botnet Network

Related Posts

EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations The Hacker News
Early Cyber Weapon ‘fast16’ Revealed by Researchers Early Cyber Weapon ‘fast16’ Revealed by Researchers The Hacker News
nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery The Hacker News
DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft The Hacker News
SystemBC Powers REM Proxy With 1,500 Daily VPS Victims Across 80 C2 Servers SystemBC Powers REM Proxy With 1,500 Daily VPS Victims Across 80 C2 Servers The Hacker News
Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Agent Deletes Database in Seconds: Security Alert
  • North Korean Hackers Target Pharma Firms with Malware
  • EU Pushes Google to Share Anonymized User Data
  • Google Patches Critical Gemini CLI Vulnerability
  • ClickUp’s API Key Leak Exposes Fortune 500 Emails

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Agent Deletes Database in Seconds: Security Alert
  • North Korean Hackers Target Pharma Firms with Malware
  • EU Pushes Google to Share Anonymized User Data
  • Google Patches Critical Gemini CLI Vulnerability
  • ClickUp’s API Key Leak Exposes Fortune 500 Emails

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark