Critical vulnerability in Veeam Backup & Replication requires immediate patching
by Tina Siering
The cloud backup software "Veeam Backup & Replication", which is used to back up local VMs as well as data from cloud services such as AWS and Microsoft 365, is affected by a critical vulnerability.
The vulnerability, which is registered under CVE-2023-27532, allows attackers to gain access to the credentials in the configuration database, even if they are encrypted. The process Veeam.Backup.Service.exe seems to be particularly vulnerable.
The vulnerability is rated "high" according to the Common Vulnerability Scoring System (CVSS) with a severity level of 7.5.
Recommended Action:
CVE-2023-27532 affects all versions of Veeam Backup & Replication. Security updates are available for versions 11a and 12.
Note: According to the manufacturer's release information, an upgrade to version 12 is required for version 11a.
Workaround until patching: Administrators can block access to TCP port 9401 to temporarily secure systems.
Further information: https://www.veeam.com/kb4424