Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical RCE Bug Rated 9.9 CVSS in Backup & Replication

Critical RCE Bug Rated 9.9 CVSS in Backup & Replication

Posted on June 18, 2025June 18, 2025 By CWS

Jun 18, 2025Ravie LakshmananVulnerability / Knowledge Safety

Veeam has rolled out patches to include a crucial safety flaw impacting its Backup & Replication software program that would end in distant code execution beneath sure circumstances.
The safety defect, tracked as CVE-2025-23121, carries a CVSS rating of 9.9 out of a most of 10.0.
“A vulnerability permitting distant code execution (RCE) on the Backup Server by an authenticated area consumer,” the corporate mentioned in an advisory.
CVE-2025-23121 impacts all earlier model 12 builds, together with 12.3.1.1139. It has been addressed in model 12.3.2 (construct 12.3.2.3617). Safety researchers at CODE WHITE GmbH and watchTowr have been credited with discovering and reporting the vulnerability.

Cybersecurity firm Rapid7 famous that the replace doubtless addresses considerations shared by CODE WHITE in late March 2025 that the patch put in place to plug the same gap (CVE-2025-23120, CVSS rating: 9.9) might be bypassed.
Additionally addressed by Veeam is one other flaw in the identical product (CVE-2025-24286, CVSS rating: 7.2) that enables an authenticated consumer with the Backup Operator position to switch backup jobs, which might end in arbitrary code execution.
The American firm individually patched a vulnerability that affected Veeam Agent for Microsoft Home windows (CVE-2025-24287, CVSS rating: 6.1) that allows native system customers to switch listing contents, resulting in code execution with elevated permissions. The problem has been patched in model 6.3.2 (construct 6.3.2.1205).
In keeping with Rapid7, greater than 20% of its incident response instances in 2024 concerned both the entry or exploitation of Veeam, as soon as a risk actor has already established a foothold within the goal atmosphere.
With safety flaws in Veeam backup software program turning into a main goal for attackers in recent times, it is essential that prospects replace to the most recent model of the software program with speedy impact.

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Backup, Bug, Critical, CVSS, Rated, RCE, Replication

Post navigation

Previous Post: Iran Slows Internet to Prevent Cyber Attacks Amid Escalating Regional Conflict
Next Post: Ex-CIA Analyst Sentenced to 37 Months for Leaking Top Secret National Defense Documents

Related Posts

Validate Security Measures Against Real Threats Validate Security Measures Against Real Threats The Hacker News
Google Launches ‘Private AI Compute’ — Secure AI Processing with On-Device-Level Privacy Google Launches ‘Private AI Compute’ — Secure AI Processing with On-Device-Level Privacy The Hacker News
Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers The Hacker News
Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks The Hacker News
New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus The Hacker News
Europol Dismantles Major Phishing Service Linked to 64,000 Attacks Europol Dismantles Major Phishing Service Linked to 64,000 Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark