Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Veeam Backup RCE Vulnerabilities Let Attackers Execute Malicious Code Remotely

Posted on October 15, 2025October 15, 2025 By CWS

Veeam Software program has disclosed three severe safety flaws in its Backup & Replication suite and Agent for Microsoft Home windows, which allow distant code execution and privilege escalation, doubtlessly compromising enterprise backup infrastructures.

These vulnerabilities, patched in current updates, primarily have an effect on domain-joined techniques in model 12 of the software program. Organizations are urged to use fixes instantly to forestall potential information breaches or ransomware exploitation.

CVE IDDescriptionSeverityCVSS v3.1 ScoreAffected VersionsPatched VersionCVE-2025-48983Veeam Backup & Replication 12.3.2.3617 and all earlier variations 12 buildsCritical9.9Veeam Backup & Replication 12.3.2.3617 and all earlier model of 12 builds12.3.2.4165 PatchCVE-2025-48984Vulnerability permitting RCE on the Backup Server by an authenticated area userCritical9.9Veeam Agent for Microsoft Home windows 6.3.2.1205 and all earlier variations 6 builds12.3.2.4165 PatchCVE-2025-48982Local Privilege Escalation in Veeam Agent for Microsoft Home windows if an administrator is tricked into restoring malicious fileHigh7.3Local Privilege Escalation in Veeam Agent for Microsoft Home windows if administrator is tricked into restoring malicious file6.3.2.1302

Mount Service RCE Threatens Backup Hosts

The primary vital challenge, CVE-2025-48983, resides within the Mount service of Veeam Backup & Replication, permitting an authenticated area consumer to execute arbitrary code on backup infrastructure hosts.

With a CVSS v3.1 rating of 9.9, this flaw was reported by CODE WHITE and impacts all model 12 builds as much as 12.3.2.3617, together with unsupported older releases, that are possible susceptible.

Veeam notes that solely domain-joined configurations are in danger, whereas the Veeam Software program Equipment and forthcoming model 13 stay architecturally unaffected.

The patch, construct 12.3.2.4165, resolves the difficulty by hardening the service towards unauthorized code injection. Directors are suggested to comply with Veeam’s finest practices, favoring workgroup setups over area integration for enhanced safety.

Backup Server Uncovered To Area Person Assaults

Equally extreme is CVE-2025-48984, one other RCE vulnerability concentrating on the Backup Server itself, exploitable by authenticated area customers with an ideal 9.9 CVSS rating.

Found by Sina Kheirkhah and Piotr Bazydlo of watchTowr, it shares the identical affected variations as CVE-2025-48983, restricted to domain-joined Veeam Backup & Replication v12 environments.

Unsupported variations needs to be handled as susceptible, although not explicitly examined. The identical patch, 12.3.2.4165, eliminates this threat, emphasizing the necessity for swift updates in hybrid or Energetic Listing-integrated setups.

This flaw underscores the hazards of over-privileged area entry in backup techniques, doubtlessly enabling lateral motion throughout networks.

Agent’s Restore Flaw Permits Privilege Escalation

Complementing the RCE points, CVE-2025-48982 impacts Veeam Agent for Microsoft Home windows, allowing native privilege escalation if an administrator restores a malicious file, rated excessive severity at 7.3 CVSS.

Reported anonymously by way of Development Micro’s Zero Day Initiative, it hits variations as much as 6.3.2.1205, built-in with Backup & Replication or standalone.

Exploitation requires tricking a consumer into restoration, however might elevate attacker privileges considerably. Fastened in construct 6.3.2.1302, this patch is essential for endpoint safety in Home windows environments.

Veeam recommends verifying all agent cases and isolating backups to mitigate social engineering dangers. Organizations utilizing affected variations ought to prioritize updates to safeguard towards code execution threats.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attackers, Backup, Code, Critical, Execute, Malicious, RCE, Remotely, Veeam, Vulnerabilities

Post navigation

Previous Post: Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access
Next Post: Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control

Related Posts

Threat Actors Attack PayPal Users in New Account Profile Set up Scam Cyber Security News
Kimsuky APT Hackers Weaponizing LNK Files to Deploy Reflective Malware Bypassing Windows Defender Cyber Security News
Rhadamanthys Infostealer Leveraging ClickFix Technique to Steal Login Credentials Cyber Security News
Chinese Hackers Weaponized Nezha Tool to Execute Commands on Web Server Cyber Security News
Critical DNN Platform Vulnerability Let Attackers Execute Malicious Scripts Cyber Security News
Anatsa Android Banking Malware from Google Play Targeting Users in the U.S. and Canada Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • TigerJack Hacks Infiltrated Developer Marketplaces with 11 Malicious VS Code Extensions
  • How Attackers Bypass Synced Passkeys
  • ICS Patch Tuesday: Fixes Announced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact
  • Windows 11 And Server 2025 Will Start Caching Plaintext Credentials By Enabling WDigest Authentication
  • Windows Agere Modem Driver 0-Day Vulnerabilities Actively Exploited To Escalate Privileges

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • TigerJack Hacks Infiltrated Developer Marketplaces with 11 Malicious VS Code Extensions
  • How Attackers Bypass Synced Passkeys
  • ICS Patch Tuesday: Fixes Announced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact
  • Windows 11 And Server 2025 Will Start Caching Plaintext Credentials By Enabling WDigest Authentication
  • Windows Agere Modem Driver 0-Day Vulnerabilities Actively Exploited To Escalate Privileges

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News