Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Veeam Patches Critical RCE Vulnerability with CVSS 9.0 in Backup & Replication

Posted on January 7, 2026January 7, 2026 By CWS

Jan 07, 2026Ravie LakshmananVulnerability / Enterprise Safety
Veeam has launched safety updates to handle a number of flaws in its Backup & Replication software program, together with a “vital” difficulty that would lead to distant code execution (RCE).
The vulnerability, tracked as CVE-2025-59470, carries a CVSS rating of 9.0.
“This vulnerability permits a Backup or Tape Operator to carry out distant code execution (RCE) because the postgres person by sending a malicious interval or order parameter,” it mentioned in a Tuesday bulletin.
Based on Veeam’s documentation, a person with a Backup Operator function can begin and cease current jobs; export backups; copy backups; and create VeeamZip backups. A Tape Operator person, however, can run tape backup jobs or tape catalog jobs; eject tapes; import and export tapes; transfer tapes to a media pool; copy or erase tapes; and set a tape password.
In different phrases, these roles are thought of extremely privileged, and organizations ought to already be taking satisfactory protections to stop them from being misused.

Veeam mentioned it is treating the shortcoming as “excessive severity” regardless of the CVSS rating, stating the chance for exploitation is diminished if clients observe Veeam’s really helpful Safety Pointers.
Additionally addressed by the corporate are three different vulnerabilities in the identical product –

CVE-2025-55125 (CVSS rating: 7.2) – A vulnerability that permits a Backup or Tape Operator to carry out RCE as root by making a malicious backup configuration file
CVE-2025-59468 (CVSS rating: 6.7) – A vulnerability that permits a Backup Administrator to carry out RCE because the postgres person by sending a malicious password parameter
CVE-2025-59469 (CVSS rating: 7.2) – A vulnerability that permits a Backup or Tape Operator to write down recordsdata as root

All 4 recognized vulnerabilities have an effect on Veeam Backup & Replication 13.0.1.180 and all earlier variations of 13 builds. They’ve been addressed in Backup & Replication model 13.0.1.1071.
Whereas Veeam makes no point out of the issues being exploited within the wild, it is important that customers promptly apply the fixes, on condition that vulnerabilities within the software program have been exploited by menace actors up to now.

The Hacker News Tags:Backup, Critical, CVSS, Patches, RCE, Replication, Veeam, Vulnerability

Post navigation

Previous Post: Chinese Hackers Actively Attacking Taiwan Critical Infrastructure
Next Post: The Future of Cybersecurity Includes Non-Human Employees

Related Posts

China-Linked Hackers Launch Targeted Espionage Campaign on African IT Infrastructure The Hacker News
Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps The Hacker News
Microsoft Helps CBI Dismantle Indian Call Centers Behind Japanese Tech Support Scam The Hacker News
North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware The Hacker News
What Attackers Are Doing With Them The Hacker News
Why Non-Human Identity Management is the Next Cybersecurity Frontier The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark