Veeam Backup: Code smuggling possible through MitM gap in updater

Veeam Backup contains an updater that is vulnerable to man-in-the-middle attacks. Attackers can inject malicious code.

listen Print view
Criminals attack server, admin tries to pull the plug

(Image: Bild erstellt mit KI in Bing Designer durch heise online / dmk)

2 min. read

An updater is used in Veeam Backup Appliances that has a security vulnerability. Attackers can use it to infiltrate and execute malicious code. Updates are available.

Veeam discusses the vulnerability in a security advisory. “A vulnerability in the Veeam Updater component allows attackers to use a man-in-the-middle attack to execute arbitrary code on affected appliances with root privileges,” writes the manufacturer (CVE-2025-23114, CVSS 9.0, risk “critical”). This affects the current version of Veeam Backup for Salesforce 3.1 and earlier.

The attempt to list the affected versions is somewhat thwarted by the marketing efforts to minimize the gap and impact. Specifically affected are Veeam Backup for AWS 6a and 7, for Google Cloud 4 and 5, for Microsoft Azure 6a and 6, for Nutanix AHV 5.0 and 5.1 as well as for Oracle Linux Virtualization Manager and Red Hat Virtualization 3, 4.0 and 4.1. However, updated versions have been available for some of these since the middle of last year. For Veeam Backup for Salesforce, the updater component is now available in version 7.9.0.1124, which also fixes the vulnerability.

Videos by heise

Anyone using Veeam Backup & Replication with these appliances must update the software to version 12.3 or later and update the appliances to the aforementioned corrected versions or later. The updated packages should be available for download from the Veeam repository. However, the appliances and software contain an easy-to-use update mechanism that is active by default and should have already performed the updates. IT managers should check this and update if necessary.

Security gaps in the Veeam Service Provider Console (VSPC) were last noticed last December. A critical vulnerability allowed malicious code to be injected and executed, while a high-risk vulnerability allowed access to NTLM hashes. Here, too, updates are available to patch the vulnerabilities.

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.