Veeam warns of critical flaws exposing backup servers to RCE attacks
好的,我现在需要帮用户总结一篇文章,控制在100字以内。首先,我得仔细阅读文章内容,抓住主要信息。 文章讲的是Veeam Software修复了其备份和复制解决方案中的多个漏洞,包括四个关键的远程代码执行漏洞。这些漏洞允许低权限用户或备份查看者在服务器上执行代码。此外,还有其他高危漏洞涉及权限提升、提取SSH凭证和文件操作。这些漏洞是在内部测试或通过HackerOne报告发现的,并且已经修复在特定版本中。Veeam建议用户尽快升级软件,因为攻击者可能会迅速开发利用这些漏洞的攻击。 另外,文章提到VBR服务器常被勒索软件攻击,因为它们作为跳板点容易被利用。一些知名的威胁集团如FIN7和Cuba都曾利用过这些漏洞。 现在我需要将这些信息浓缩到100字以内,确保涵盖关键点:公司名称、修复的漏洞数量及类型、受影响的用户、其他高危问题、修复版本、升级建议以及勒索软件攻击的情况。 可能的结构是:Veeam修复了多个漏洞,包括四个RCE漏洞,影响低权限用户和备份查看者;其他高危问题涉及权限提升等;建议升级到最新版本以防止攻击;VBR服务器常被勒索软件攻击。 这样应该能在100字内准确传达主要内容。 </think> Veeam修复了Backup & Replication中的多个安全漏洞,包括四个关键远程代码执行漏洞,允许低权限用户或Backup Viewer在备份服务器上执行代码。此外还修复了其他高危漏洞,涉及权限提升、提取SSH凭证和文件操作等。建议用户尽快升级到最新版本以防止潜在攻击。 2026-3-12 17:0:20 Author: www.bleepingcomputer.com(查看原文) 阅读量:7 收藏

Veeam

Data protection company Veeam Software has patched multiple flaws in its Backup & Replication solution, including four critical remote code execution (RCE) vulnerabilities.

VBR is enterprise data backup and recovery software that helps IT administrators to create copies of critical data for quick restoration following cyberattacks and hardware failures.

Three RCE security flaws patched today (tracked as CVE-2026-21666, CVE-2026-21667, and CVE-2026-21669) allow low-privileged domain users to execute remote code on vulnerable backup servers in low-complexity attacks.

The fourth one (tracked as CVE-2026-21708) allows a Backup Viewer to gain remote code execution as the postgres user.

Veeam also addressed several high-severity security bugs that can be exploited to escalate privileges on Windows-based Veeam Backup & Replication servers, extract saved SSH credentials, and bypass restrictions to manipulate arbitrary files on a Backup Repository.

These vulnerabilities were discovered during internal testing or reported through HackerOne and are resolved in Veeam Backup & Replication versions 12.3.2.4465 and 13.0.1.2067.

Veeam also warned admins to upgrade the software to the latest release as soon as possible, since threat actors often begin developing exploits shortly after patches are released.

"It's important to note that once a vulnerability and its associated patch are disclosed, attackers will likely attempt to reverse-engineer the patch to exploit unpatched deployments of Veeam software," the company warned. "This reality underscores the critical importance of ensuring that all customers use the latest versions of our software and install all updates and patches without delay."

VBR servers targeted in ransomware attacks

VBR is popular among managed service providers and mid-sized to large enterprises, even though ransomware gangs commonly target VBR servers because they can serve as a quick jumping-off point for lateral movement within breached networks, simplify data theft, and make it easy to block restoration efforts by deleting victims' backups.

The financially motivated FIN7 threat group (which previously collaborated with the Conti, REvil, Maze, Egregor, and BlackBasta ransomware groups) and the Cuba ransomware gang have both been linked to past attacks targeting VBR vulnerabilities.

Sophos X-Ops incident responders also revealed in November 2024 that Frag ransomware exploited another VBR RCE bug disclosed two months earlier and also used in Akira and Fog ransomware attacks starting in October 2024.

Veeam says its products are used by more than 550,000 customers worldwide, including 74% of Global 2,000 firms and 82% of Fortune 500 companies.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/veeam-warns-of-critical-flaws-exposing-backup-servers-to-rce-attacks/
如有侵权请联系:admin#unsafe.sh