Remote Code Execution Vulnerability in Veeam Software
CVE-2025-23120

9.9CRITICAL

Key Information:

Vendor
Veeam
Vendor
CVE Published:
20 March 2025

Badges

📈 Trended📈 Score: 5,760💰 Ransomware👾 Exploit Exists📰 News Worthy

What is CVE-2025-23120?

CVE-2025-23120 is a critical remote code execution vulnerability found in Veeam Software, a popular provider of backup solutions that help organizations manage and protect their data. This vulnerability could allow malicious domain users to execute arbitrary code on affected systems, posing a significant threat to the security and integrity of organizational data. The ability for unauthorized access through this vulnerability means that sensitive information may be compromised, leading to potential data loss and disruption of services.

Technical Details

CVE-2025-23120 has been characterized as a remote code execution (RCE) flaw, which indicates that the vulnerability can be exploited over a network, without the need for physical access to the vulnerable system. The specifics of the exploit allow attackers with domain user privileges to leverage this vulnerability to execute code remotely, which can lead to unauthorized control of the affected systems. Detailed information regarding the technical aspects of the vulnerability can be found in the associated patches and documentation from the vendor.

Potential impact of CVE-2025-23120

  1. Unauthorized System Access: The vulnerability could enable attackers to gain unauthorized access to systems, allowing them to execute malicious code. This could lead to full control over those systems, potentially resulting in data breaches or the deployment of further malicious activities.

  2. Data Compromise: With the ability to execute arbitrary commands, attackers may access, modify, or delete sensitive data within the organization. This jeopardizes data integrity and confidentiality, with implications for compliance with data protection regulations.

  3. Service Disruption: Exploitation of this vulnerability could lead to system crashes or disruption of essential services, impacting business operations and potentially leading to financial losses. Organizations may also face additional costs associated with incident response and recovery efforts.

Affected Version(s)

Backup and Recovery 12.3

News Articles

Critical Vulnerability in Veeam Software

Veeam has released updates addressing a critical vulnerability (CVE-2025-23120) in Veeam Backup & Replication software that affects domain-joined installations.

5 days ago

Week in review: Veeam Backup & Replication RCE fixed, free file converter sites deliver malware - Help Net Security

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Critical Veeam Backup & Replication RCE vulnerability

1 week ago

Veeam RCE bug lets domain users hack backup servers, patch now

Veeam has patched a critical remote code execution vulnerability tracked as CVE-2025-23120 in its Backup & Replication software that impacts domain-joined installations.

1 week ago

References

CVSS V3.0

Score:
9.9
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • 📈

    Vulnerability started trending

  • 💰

    Used in Ransomware

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by SecurityWeek

  • Vulnerability published

  • Vulnerability Reserved

.