Veeam’s Bug Battle: Critical Flaw Fixes Turn Backup Software into a Safer Haven!
Veeam’s Backup & Replication software was hit with a security flaw so severe it scored a 9.9 on the CVSS scale. This bug allows remote code execution, meaning hackers could throw a party on your server. Thankfully, Veeam’s patched it up, so remember to update faster than you can say CVE-2025-23121!

Hot Take:
Veeam’s Backup & Replication software just went from “Back up your data” to “Back up your security patches!” With a vulnerability score of 9.9 out of 10, it’s almost impressive how it’s teetering on the brink of a perfect 10. But hey, at least they’re consistent—fixing old holes just to open new ones. It’s the circle of vulnerability life, folks!
Key Points:
- Veeam’s Backup & Replication software had a critical flaw (CVE-2025-23121) with a CVSS score of 9.9.
- The flaw allows remote code execution by an authenticated domain user.
- The issue was fixed in version 12.3.2 (build 12.3.2.3617).
- Another flaw (CVE-2025-24286) allows modification of backup jobs, also leading to code execution.
- Veeam Agent for Microsoft Windows had a separate vulnerability (CVE-2025-24287) patched in version 6.3.2.
Already a member? Log in here