Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Veeam Patches Critical RCE Vulnerability with CVSS 9.0 in Backup & Replication

Posted on January 7, 2026January 7, 2026 By CWS

Jan 07, 2026Ravie LakshmananVulnerability / Enterprise Safety
Veeam has launched safety updates to handle a number of flaws in its Backup & Replication software program, together with a “vital” difficulty that would lead to distant code execution (RCE).
The vulnerability, tracked as CVE-2025-59470, carries a CVSS rating of 9.0.
“This vulnerability permits a Backup or Tape Operator to carry out distant code execution (RCE) because the postgres person by sending a malicious interval or order parameter,” it mentioned in a Tuesday bulletin.
Based on Veeam’s documentation, a person with a Backup Operator function can begin and cease current jobs; export backups; copy backups; and create VeeamZip backups. A Tape Operator person, however, can run tape backup jobs or tape catalog jobs; eject tapes; import and export tapes; transfer tapes to a media pool; copy or erase tapes; and set a tape password.
In different phrases, these roles are thought of extremely privileged, and organizations ought to already be taking satisfactory protections to stop them from being misused.

Veeam mentioned it is treating the shortcoming as “excessive severity” regardless of the CVSS rating, stating the chance for exploitation is diminished if clients observe Veeam’s really helpful Safety Pointers.
Additionally addressed by the corporate are three different vulnerabilities in the identical product –

CVE-2025-55125 (CVSS rating: 7.2) – A vulnerability that permits a Backup or Tape Operator to carry out RCE as root by making a malicious backup configuration file
CVE-2025-59468 (CVSS rating: 6.7) – A vulnerability that permits a Backup Administrator to carry out RCE because the postgres person by sending a malicious password parameter
CVE-2025-59469 (CVSS rating: 7.2) – A vulnerability that permits a Backup or Tape Operator to write down recordsdata as root

All 4 recognized vulnerabilities have an effect on Veeam Backup & Replication 13.0.1.180 and all earlier variations of 13 builds. They’ve been addressed in Backup & Replication model 13.0.1.1071.
Whereas Veeam makes no point out of the issues being exploited within the wild, it is important that customers promptly apply the fixes, on condition that vulnerabilities within the software program have been exploited by menace actors up to now.

The Hacker News Tags:Backup, Critical, CVSS, Patches, RCE, Replication, Veeam, Vulnerability

Post navigation

Previous Post: Chinese Hackers Actively Attacking Taiwan Critical Infrastructure
Next Post: The Future of Cybersecurity Includes Non-Human Employees

Related Posts

Researchers Expose GhostCall and GhostHire: BlueNoroff’s New Malware Chains The Hacker News
Introducing Astrix’s AI Agent Control Plane The Hacker News
Russia-Linked Hackers Target Tajikistan Government with Weaponized Word Documents The Hacker News
WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens The Hacker News
Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts The Hacker News
Building Cyber Resilience in Financial Services The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 377,000 Impacted by Data Breach at Texas Gas Station Firm
  • 10 Best Bot Protection Software
  • Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions
  • CISA Retires 10 Emergency Cybersecurity Directives Issued Between 2019 and 2024
  • SmarterTools SmarterMail Vulnerability Enables Remote Code Execution Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 377,000 Impacted by Data Breach at Texas Gas Station Firm
  • 10 Best Bot Protection Software
  • Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions
  • CISA Retires 10 Emergency Cybersecurity Directives Issued Between 2019 and 2024
  • SmarterTools SmarterMail Vulnerability Enables Remote Code Execution Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark