Veeam’s Backup Blunder: Patch Now or Risk Remote Code Chaos!
Veeam released a security update to fix a critical flaw in its Backup & Replication software that could allow remote code execution. This vulnerability, CVE-2025-23120, scores a whopping 9.9 out of 10 on the CVSS scale. It’s like finding out your backup software has a secret second career as a hacker’s playground!

Hot Take:
Veeam’s Backup & Replication software just got a patch for a bug so critical, it might as well have been applying for a role in the next Mission Impossible movie. With a CVSS score of 9.9, hackers could practically hear the theme song. Luckily, Veeam seems to have outsmarted the hackers by blocking their way with a digital wall of “Thou Shalt Not Pass!” Is that a Gandalf reference or just a really good security update? You decide.
Key Points:
- Veeam’s Backup & Replication software had a critical security flaw, CVE-2025-23120, with a CVSS score of 9.9.
- The flaw involved a deserialization vulnerability allowing remote code execution by authenticated domain users.
- Security researcher Piotr Bazydlo discovered and reported the flaw, leading to a patch in version 12.3.1.
- The patch adds deserialization gadgets to a blocklist, but future vulnerabilities could still arise if new gadgets are found.
- IBM also addressed critical bugs in its AIX operating system, with CVSS scores up to a perfect 10.
Already a member? Log in here