Remote Code Execution Vulnerability in Veeam Backup Server
CVE-2026-21666

10CRITICAL

Key Information:

Vendor

Veeam

Vendor
CVE Published:
12 March 2026

What is CVE-2026-21666?

CVE-2026-21666 is a significant vulnerability affecting the Veeam Backup Server, which is used for backup and recovery processes in enterprise environments. This vulnerability allows an authenticated domain user to execute remote code on the Backup Server. This capability can be exploited by malicious actors with valid domain credentials, potentially allowing them to manipulate backups, disrupt recovery procedures, or deploy further malicious activities within the network. As organizations increasingly rely on backup solutions for data integrity and recovery, the existence of such vulnerabilities poses a serious threat to operational continuity and data security.

Potential Impact of CVE-2026-21666

  1. Unauthorized Access and Control: The vulnerability enables authenticated users to execute arbitrary code, which could lead to unauthorized access to sensitive systems and data managed by the Veeam Backup Server. This access could facilitate further infiltration and lateral movement within an organization’s network.

  2. Data Integrity Compromise: By exploiting this vulnerability, attackers could alter, delete, or steal critical backup data. This manipulation not only risks data integrity but also undermines the trust in recovery operations, potentially leading to data loss during disaster recovery scenarios.

  3. Operational Disruption: The ability to execute remote code could allow attackers to disrupt backup operations, leading to downtime and hindrance of data recovery processes. Such disruptions can have cascading effects on business operations and compliance with regulatory standards regarding data protection.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Backup and Replication 12.3.2

References

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.