There are two critical CVEs that affect Veeam Backup & Replication and account for two of the three critical Veeam Backup & Replication CVEs, and the most serious of the products affected. The Critical Veeam Backup & Replication vulnerability notes include: CVE-2022-26500 | CVE-2022-26501
- CVE-2022-26500, CVE–2022-26501: These two CVEs relate to Veeam Backup & Replication allow executing malicious code remotely without authentication. This may lead to gaining control over the target system. This carries a CVSS rating of 9.8 and is classified as Critical.
Cause? – The vulnerability is caused by the Veeam Distribution Service, running on TCP 9380 by default, allows unauthenticated users to access internal Veeam API functions. An attacker may send input to the Veeam API which may allow uploading and executing malicious code.
It is worth nothing that patches are available for Veeam 11a and 10a as follow
- 11a – Build 184.108.40.2061 P20220302: https://www.veeam.com/kb4245?ad=in-text-link
- 10a – Build 10.0.1.4854 P20220304: https://www.veeam.com/kb4291?ad=in-text-link
Note: If you are using Veeam Backup & Replication 9.5, please upgrade to a supported product version.
If you currently do not have time to apply these updates, here is a workaround.
- Stop and disable the Veeam Distribution Service. The Veeam Distribution Service is installed on the Veeam Backup & Replication server and servers specified as distribution servers in Protection Groups.
Thanks for sharing.
Thanks for sharing.
You are welcome
Note: All new deployments of Veeam Backup & Replication version 11 and 10 installed using the ISO images dated 20220302 or later are not vulnerable.
Here is the link to the blogpost!
It’s important to note that if you are using v11 before v11a you need to upgrade to v11a to solve the vulnerability.
Just thought I’d add this in, but no doubt everyone is already doing it. Make sure you have a backup of your Veeam config before you upgrade, just in case.