CVE-2022-26501
Veeam Backup & Replication vulnerability analysis and mitigation

Overview

CVE-2022-26501 is a critical vulnerability affecting Veeam Backup & Replication versions 9.5, 10.x, and 11.x. The vulnerability was discovered by Nikita Petrov from Positive Technologies and disclosed in March 2022. It involves improper authentication that allows attackers to execute arbitrary code remotely without authentication (CVE Details, Veeam KB).

Technical details

The vulnerability has received a critical CVSS v3.1 base score of 9.8 and a CVSS v2.0 score of 10.0. The vulnerability exists in the Veeam Distribution Service (TCP port 9380 by default), which allows unauthenticated users to access internal API functions. A remote attacker can send malicious input to the internal API, potentially leading to code execution (NVD, Veeam KB).

Impact

Successful exploitation of this vulnerability could result in complete system compromise, allowing attackers to gain control over the target system. The potential impacts include data loss, ransomware infection, and denial-of-service attacks. The vulnerability has been observed being exploited by ransomware groups like Monti and Yanluowang to steal login information from Veeam backup management software SQL databases (SOCRadar).

Mitigation and workarounds

Veeam has released patches for versions 10 and 11 with builds 10a (10.0.1.4854 P20220304) and 11a (11.0.1.1261 P20220302) respectively. Users of version 9.5 are advised to upgrade to a supported version. As a temporary mitigation, organizations can stop and disable the Veeam Distribution Service on both the Veeam Backup & Replication server and servers specified as distribution servers in Protection Groups (Veeam KB).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management