Veeam’s “Perfect” Patch: A Comedy of Errors in Backup Security
Veeam Backup & Replication users, it’s patch o’clock! Yet another critical bug, CVE-2025-23121, threatens remote code execution on your domain-joined servers. Veeam advises against domain-joining, but hey, who reads manuals, right? Time to patch up before your server joins the dark side!

Hot Take:
Veeam, oh Veeam! If patching vulnerabilities was an Olympic sport, you’d be competing for gold, but maybe without the grace of a gymnast. With critical bugs popping up faster than whack-a-moles, it’s time to retire that old BinaryFormatter like those bell-bottoms from the ’70s. Kudos on your forthcoming V13 release, but until then, users, consider this a friendly reminder: your backup server shouldn’t moonlight as a domain member lest it get invited to a hacker party!
Key Points:
- Veeam Backup & Replication servers are facing yet another critical vulnerability, CVE-2025-23121.
- Domain-joined servers are particularly vulnerable, despite Veeam’s advice against such configurations.
- The recurring vulnerabilities stem from the deprecated BinaryFormatter component.
- Veeam plans to eliminate BinaryFormatter in its upcoming version 13, aiming for a more secure future.
- Ransomware groups have actively exploited these vulnerabilities, highlighting the urgency for patches.