Patch now! Attackers exploit Nakivo Backup & Replication Director
Attackers are exploiting a security vulnerability in the backup solution Nakivo Backup & Replication Director. A security patch is available.
(Image: Gorodenkoff/Shutterstock.com)
Admins who manage backups with Nakivo Backup & Replication Director should update the application immediately due to ongoing attacks. In the current version, the developers have closed a vulnerability that could, in the worst case, allow malicious code to reach PCs.
Install a security patch
The vulnerability (CVE-2025-48248"high") has been known since the beginning of March 2025. The US security authority Cybersecurity & Infrastructure Security Agency (CISA) is now warning of attacks. In a warning message, the software manufacturer assures that it has closed the vulnerability in version 11.0.0.88174. All previous versions are said to be vulnerable.
If attackers successfully exploit the vulnerability, they can gain unauthorized access to sensitive data. This could include access data. According to the description of the vulnerability, malicious code can get onto computers and completely compromise systems. The extent of the attacks is still unclear.
Videos by heise
Nakivo recommends that admins keep an eye out for unauthorized access in logs. They also recommend dividing networks into segments and restricting access using firewall rules to increase IT security. These security tips are of course not new and should be standard practice.
In a detailed report, the discoverers of the vulnerability from watchTowr provide details of the weakness.
(des)