FRESH DEALS: KVM VPS PROMOS NOW AVAILABLE IN SELECT LOCATIONS!

DediRock is Waging War On High Prices Sign Up Now

Veeam Backup Suite Vulnerabilities: Remote Code Execution and Malicious Backup Config File Risks

The recent discovery of vulnerabilities within Veeam’s Backup & Replication suite has raised significant concerns for users. The company confirmed that four critical flaws could potentially enable malicious actors with certain user roles to perform remote code execution and create harmful backup configuration files. In response, Veeam has issued a patch for the impacted version 13.

The most severe vulnerability, identified as CVE-2025-59470, has a criticality score of 9, allowing those with Backup Admin, Backup Operator, or Tape Operator roles more access than intended. Veeam’s vice-president of product strategy remarked on the possibility of severe damage, although emphasized that the nature of the backup data means it cannot be destroyed.

The vulnerabilities are as follows:

  • CVE-2025-59470: Allows remote code execution as the Postgres user via a malicious parameter.
  • CVE-2025-59469: Grants permissions to write files as root.
  • CVE-2025-55125: Enables remote code execution as root through a malicious backup configuration file.
  • CVE-2025-59468: Allows remote code execution as the Postgres user via a malicious password parameter.

Applying the patch, version 13.0.1.1071, is described as straightforward and non-disruptive. Despite the serious nature of the vulnerabilities, Veeam has not reported any instances of exploitation as of the latest updates. The robust nature of the backup system means, should a server encounter issues, new servers can be quickly set up and backups imported without affecting core data.

Experts advise that backup environments should be regularly audited to manage access rights effectively. This is particularly important as backup systems are prime targets for ransomware attacks that aim to compromise or erase backups. Administrators are encouraged to rigorously audit configuration files and monitor for any unexpected actions while the patching process takes place.

In summary, those using unpatched versions should remain vigilant and ready to respond to any unusual activities that may indicate the presence of a malicious actor.


Welcome to DediRock, your trusted partner in high-performance hosting solutions. At DediRock, we specialize in providing dedicated servers, VPS hosting, and cloud services tailored to meet the unique needs of businesses and individuals alike. Our mission is to deliver reliable, scalable, and secure hosting solutions that empower our clients to achieve their digital goals. With a commitment to exceptional customer support, cutting-edge technology, and robust infrastructure, DediRock stands out as a leader in the hosting industry. Join us and experience the difference that dedicated service and unwavering reliability can make for your online presence. Launch our website.

Share this Post

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Search

Categories

Tags

0
Would love your thoughts, please comment.x
()
x