Finance

Urgent Alert: Critical Veeam RCE Vulnerability Exposed — Immediate Action Required!

2025-03-20

Author: Nur

Overview of the Vulnerability

Veeam has issued a crucial patch for a severe remote code execution (RCE) vulnerability classified as CVE-2025-23120, affecting installations of its Backup & Replication software that are part of a domain. This flaw poses a significant risk, allowing domain joined users to potentially compromise backup servers.

Details of the Issue

The vulnerability was disclosed yesterday and impacts Veeam Backup & Replication version 12.3.0.310 and all earlier versions of the 12.x builds. Thankfully, Veeam has rectified this issue with the release of version 12.3.1 (build 12.3.1.1139) on the same day.

Technical Analysis

WatchTowr Labs, the firm that identified the bug, described CVE-2025-23120 as a deserialization vulnerability within two specific .NET classes: Veeam.Backup.EsxManager.xmlFrameworkDs and Veeam.Backup.Core.BackupSummary. Deserialization flaws occur when a system incorrectly handles serialized data, allowing attackers to inject harmful objects capable of executing malicious code.

Previous Vulnerabilities

In a previous update, Veeam addressed an earlier deserialization RCE vulnerability found by researcher Florian Hauser, implementing a blacklist to mitigate known exploitable classes. However, WatchTowr has demonstrated that a different gadget chain—unlisted on the original blacklist—could still enable an attacker to execute harmful commands remotely.

Implications for Organizations

The implications are significant, especially since many organizations have integrated their Veeam servers within a Windows domain context, a practice that runs counter to Veeam's long-standing security recommendations. Ransomware groups have long targeted Veeam Backup & Replication servers, utilizing these vulnerabilities to steal sensitive data and obstruct recovery efforts by deleting backups.

Increased Threat Landscape

This specific flaw enhances the attractiveness of Veeam installations as targets because of the ease with which hackers can breach the servers. Although there have been no confirmed reports of exploitation in the wild thus far, the detailed technical information made available by WatchTowr might lead to the swift development of a proof of concept (PoC) exploit.

Recommended Actions

For businesses relying on Veeam Backup & Replication, it is imperative to upgrade to version 12.3.1 without delay to protect against potential exploitation. Moreover, due to the increased threat posed by ransomware gangs interested in this software, it is highly advisable to reassess security configurations and consider disconnecting Veeam servers from operational domains.

Conclusion

Don't wait for an attack to occur—take action now to secure your data and systems!